PHP Web Scripts Ad Manager Pro version 3 suffers from a remote SQL injection vulnerability.
317ae38732a6af1ceb81c85b0d31140cfc185bb4cbb40e6e91957a1400cae62f
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1
3 3
3 _ __ __ ________ __ __ 3
7 /' \ /'__`\ /'__`\ /\_____ \ /\ \/\ \ 7
1 /\_, \/\_\L\ \ /\_\L\ \\/___//'/' \_\ \ \ \____ 1
3 \/_/\ \/_/_\_<_\/_/_\_<_ /' /' /'_` \ \ '__`\ 3
3 \ \ \/\ \L\ \ /\ \L\ \ /' /' /\ \L\ \ \ \L\ \ 3
7 \ \_\ \____/ \ \____//\_/ \ \___,_\ \_,__/ 7
1 \/_/\/___/ \/___/ \// \/__,_ /\/___/ 1
3 >> Exploit database separated by exploit 3
3 type (local, remote, DoS, etc.) 3
7 7
1 [+] Site : 1337db.com 1
3 [+] Support e-mail : submit[at]1337db.com 3
3 3
7 ########################################## 7
1 I'm R4dc0re 1337 Member from 1337 DataBase 1
3 ########################################## 3
3 3
7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-7
# Author: R4dc0re
# Exploit Title: PHP Web Scripts Ad Manager Pro V3 SQl injection Vulnerability
# Date: 20-12-2010
# Vendor or Software Link: http://www.phpwebscripts.com/admanagerpro/
# Category:WebApp
# Demo Link:http://www.adnetworkscript.com/
# Version: 3
# Price: $99/$130/$325 USD
# Contact: R4dc0re@yahoo.fr
# Website: www.1337db.com
# Greetings to: R0073r(1337db.com), L0rd CrusAd3r,Sid3^effects and to rest of the 1337db members
###################################################################################################
Submit Your Exploit at Submit@1337db.com
###################################################################################################
[Product Details]
Ad Manager Pro runs on PHP and MySQL that allows you to get an indepth view including
hourly, daily, monthly statistics with both text and graphics.
It allows you to use jpg, png, gif and swf format in your rotations and even plan text/html.
Code: PHP 4.0
[Vulnerability]
SQL Injection:
http://www.adnetworkscript.com/website-page.php?pageId=[Code]
###################################################################################################