Exploit SQL Injection webzonegamerz Ranking

Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 37
  1. #16
    Member dTantra is offline
    MemberRank
    Jul 2013 Join Date
    94Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Quote Originally Posted by jbeitz107 View Post
    guys it is pretty simple to fix this issue. get rid of the get method and use post
    That won't really fix it, you can use websites like

    http://apikitchen.com/

    To send post and or get to any website.

    If you want to fix it, at the top of the script just connect to a mysql database first and run the following php.
    Code:
    	foreach ($_GET as $key => $value) 
    	{ 
    		$_GET[$key] = mysql_real_escape_string($value); 
    	}
    	foreach ($_POST as $key => $value)
    	{
    		$_POST[$key] = mysql_real_escape_string($value); 
    	}
    Last edited by dTantra; 14-09-14 at 12:01 AM.

  2. #17
    Enthusiast alxndr is offline
    MemberRank
    Nov 2012 Join Date
    Lima, PerúLocation
    45Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Quote Originally Posted by dTantra View Post
    That won't really fix it, you can use websites like

    http://apikitchen.com/

    To send post and or get to any website.

    If you want to fix it, at the top of the script just connect to a mysql database first and run the following php.
    Code:
    	foreach ($_GET as $key => $value) 
    	{ 
    		$_GET[$key] = mysql_real_escape_string($value); 
    	}
    	foreach ($_POST as $key => $value)
    	{
    		$_POST[$key] = mysql_real_escape_string($value); 
    	}
    That won't fix it either, it would be better if everyone use PDO

  3. #18
    Tantra/Web Development jbeitz107 is offline
    MemberRank
    Mar 2012 Join Date
    USALocation
    1,471Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    you don't need to use $_GET. there are other options besides that.

  4. #19
    Enthusiast alxndr is offline
    MemberRank
    Nov 2012 Join Date
    Lima, PerúLocation
    45Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Quote Originally Posted by jbeitz107 View Post
    you don't need to use $_GET. there are other options besides that.
    Leaving PDO appart, you can use whatever you want, POST or GET, if you know what are you doing you can fix them both.
    Last edited by alxndr; 14-09-14 at 04:06 AM.

  5. #20
    Tantra/Web Development jbeitz107 is offline
    MemberRank
    Mar 2012 Join Date
    USALocation
    1,471Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    agreed alxndr. i am not telling the other part for the fix but, yes i agree. the part i was mentioning simply removes the unnecessary text that is created using the forms in the url. it is only a start for them.

  6. #21
    Tantra Freelancer A v a r a is offline
    MemberRank
    Apr 2014 Join Date
    In Your HeadLocation
    554Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    You can also use arrays like:

    PHP Code:
    $dios_options = array(
        
    => 'All',
        
    => 'Brahma',
        
    => 'Shiva',
        
    => 'Vishnu',
    ); 

  7. #22
    Member dTantra is offline
    MemberRank
    Jul 2013 Join Date
    94Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Quote Originally Posted by dTantra View Post
    That won't really fix it, you can use websites like

    http://apikitchen.com/

    To send post and or get to any website.

    If you want to fix it, at the top of the script just connect to a mysql database first and run the following php.
    Code:
        foreach ($_GET as $key => $value) 
        { 
            $_GET[$key] = mysql_real_escape_string($value); 
        }
        foreach ($_POST as $key => $value)
        {
            $_POST[$key] = mysql_real_escape_string($value); 
        }
    If that does not fix it by escaping all none acceptable characters, then post me the document in question.

  8. #23
    Enthusiast alxndr is offline
    MemberRank
    Nov 2012 Join Date
    Lima, PerúLocation
    45Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Code:
    (PHP 4 >= 4.3.0, PHP 5)
    mysql_real_escape_string — Escapes special characters in a string for use in an SQL statement
    
    Code:
    Warning
    This extension is deprecated as of PHP 5.5.0, and will be removed in the future.
    Instead, the MySQLi or PDO_MySQL extension should be used.
    See also MySQL: choosing an API guide and related FAQ for more information. Alternatives to this function include:
    
    • mysqli_real_escape_string()
    • PDO::quote()
    Code:
    mysql_real_escape_string() calls MySQL's library function mysql_real_escape_string, which prepends backslashes to the following characters: \x00, \n, \r, \, ', " and \x1a.
    @dTantra all the websites that were released here work with MSSQL not MySQL. If you want to scape characters on MSSQL you must use two single quotes. But the problem here is not exploiting a string variable, instead what is being exploited is an int variable so escaping characters doesn't help to much if the injection method is using HEX as the video above.

  9. #24
    Novice arbeats is offline
    MemberRank
    Sep 2014 Join Date
    PhilippinesLocation
    1Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    did they ( owner of the said server ) fixed this already?

  10. #25
    Member dTantra is offline
    MemberRank
    Jul 2013 Join Date
    94Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Quote Originally Posted by alxndr View Post
    /snip
    If you want it fixed just post to me the script as I don't have or use it and i'll write a fix for everyone else.

  11. #26
    Enthusiast alxndr is offline
    MemberRank
    Nov 2012 Join Date
    Lima, PerúLocation
    45Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    @dTantra sorry if i got you mad, that was not my intention. Providing a script to avoid sql injection is not going to help here. Why?. Coz' most of people here don't know how to implement it. Webzonegamerz has a class sql_inject.php that if we get a bit of time to read it we could implement it flawlessly and avoid this kind of problem.

    To put a bit of fun to the post the call to this class is commented on the header.php

    PHP Code:
    <?php
    //ob_start(); 
    require_once('anti_dos.php');
    //require_once('sql_inject.php');
    require_once('antishell.class.php');
    require_once(
    'Block.php');
    require_once(
    'floodshell.php');
    //require_once('proxx.class.php');
    ?>

  12. #27
    Member dTantra is offline
    MemberRank
    Jul 2013 Join Date
    94Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Quote Originally Posted by alxndr View Post
    @dTantra sorry if i got you mad, that was not my intention. Providing a script to avoid sql injection is not going to help here. Why?. Coz' most of people here don't know how to implement it. Webzonegamerz has a class sql_inject.php that if we get a bit of time to read it we could implement it flawlessly and avoid this kind of problem.

    To put a bit of fun to the post the call to this class is commented on the header.php

    PHP Code:
    <?php
    //ob_start(); 
    require_once('anti_dos.php');
    //require_once('sql_inject.php');
    require_once('antishell.class.php');
    require_once(
    'Block.php');
    require_once(
    'floodshell.php');
    //require_once('proxx.class.php');
    ?>
    Why on earth would you think I was mad? I have never looked at or used the script in question, I understand tantra uses mssql, but I figured most websites run off of mysql, that is why I provided an attempted fix that would work off of that mysql. Since it did not solve the problem in question, I was simply asking for someone to post the php file with the problem and I would provide them a proper fix.

  13. #28
    Enthusiast alxndr is offline
    MemberRank
    Nov 2012 Join Date
    Lima, PerúLocation
    45Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Well then, sorry for misunderstanding

  14. #29
    Proficient Member heterojeneo is offline
    MemberRank
    Sep 2010 Join Date
    VenezuelaLocation
    191Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Fix problem sql inject only using this tantra BDS

    https://www.mediafire.com/?vl1m05zl3nqjafg <<< BDS FIX ORIGINAL
    https://www.mediafire.com/?vl1m05zl3nqjafg <<< BDS FIX WEB ZONEGAMERZ
    https://www.mediafire.com/?vl1m05zl3nqjafg <<< Using web admin fix news.

    regards.

  15. #30
    Tantra Freelancer A v a r a is offline
    MemberRank
    Apr 2014 Join Date
    In Your HeadLocation
    554Posts

    Re: Exploit SQL Injection webzonegamerz Ranking

    Quote Originally Posted by arbeats View Post
    did they ( owner of the said server ) fixed this already?
    Yes they already did. Are you planning to inject? lmao!



Page 2 of 3 FirstFirst 123 LastLast

Advertisement