Tested and works like a charm. Thanks, you guys rock.
On Thu, May 23, 2013 at 9:21 AM, Brandon Perry wrote:
> Can test this evening! Thanks
>
>
> On Thu, May 23, 2013 at 3:30 AM, Miroslav Stampar <
> miroslav.stam...@gmail.com> wrote:
>
>> Hi Brandon.
>>
>> Please retry it now :-)
>>
>> Kind reg
Can test this evening! Thanks
On Thu, May 23, 2013 at 3:30 AM, Miroslav Stampar <
miroslav.stam...@gmail.com> wrote:
> Hi Brandon.
>
> Please retry it now :-)
>
> Kind regards,
> Miroslav Stampar
> On May 23, 2013 5:57 AM, "Brandon Perry"
> wrote:
>
>> I am trying to pass in the following for a
Hi Guy
This is indeed a valid vulnerability.
If we take the following request:
POST /trk/lpg/index.php HTTP/1.1
Host: myimg.co
Cookie: PHPSESSID=yourID
from_date=2013-05-21&to_date=2013-05-23&campaign_id=11'5*CA-PTV*Keyword*&crap=&submit=submit&stage=2
Then we receive a response which
My script is installed on http://myimg.co/trk/lpg/
login " admin ", password " hello "
A security advisor told me that it's injectable while being logged in
manually by modifying the POST param "campaign_id"
Example:
Change " 129*US-LP-PPV*PPV* " to :
129 and ascii(substring((SELECT datab
Hi again.
I would really need to know the format of those urls inside to handle this
problem appropriately.
Kind regards,
Miroslav Stampar
On May 22, 2013 6:12 PM, "Miroslav Stampar"
wrote:
> Hi.
>
> Can you please send the content of that list file?
>
> Kind regards,
> Miroslav Stampar
> Dana
Hi Brandon.
Please retry it now :-)
Kind regards,
Miroslav Stampar
On May 23, 2013 5:57 AM, "Brandon Perry" wrote:
> I am trying to pass in the following for a header:
>
> SOAPAction:http://tempuri.org/AddUser
>
> I think the second colon is fudging things up but it is required for the
> header