The Next Generation Of Genealogy Sitebuilding SQL Injection

2017.08.30
Credit: X-Cisadane
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

========================================================================================== The Next Generation of Genealogy Sitebuilding SQL Injection Vulnerability ========================================================================================== :-------------------------------------------------------------------------------------------------------------------------: : # Exploit Title : The Next Generation of Genealogy Sitebuilding SQL Injection Vulnerability : # Date : 29th August 2017 : # Author : X-Cisadane : # CMS Name : The Next Generation of Genealogy Sitebuilding : # Version : < 11.1.1 : # CMS Developer : http://www.tngsitebuilding.com/ : # Category : Web Application : # Vulnerability : SQL Injection : # Tested On : SQLMap 1.1.8.16#dev (Windows 7 64-bit) : # Greetz to : X-Code YogyaFree, ExploreCrew, CodeNesia, Bogor Hackers Community, Borneo Crew, Depok Cyber, Mantan :-------------------------------------------------------------------------------------------------------------------------: A SQL Injection Vulnerability has been discovered in the The Next Generation of Genealogy Sitebuilding CMS. The vulnerability allows remote attackers to execute own SQL Commands by usage of a vulnerable serivce value. The vulnerability is located in the primaryID value of the timeline2.php file. Remote attackers are able to execute own SQL Commands by usage of a GET method request with manipulated primaryID value. Remote attackers are able to read database information by execution of own SQL Commands. DORKS (How to find the target) : ================================ inurl:/timeline2.php?primaryID= Or "powered by The Next Generation of Genealogy Sitebuilding" Or use your own Google Dorks :) Proof of Concept ================ SQL Injection PoC : http://[Site]/[Path]/timeline2.php?primaryID=['SQLi] Screenshot (PoC) : https://s20.postimg.org/asdu29rwt/Screenshot_99.png https://s20.postimg.org/wsu6iwakt/Screenshot_100.png Example of Vuln Sites : http://1820settlers.co.uk/genealogy/timeline2.php?primaryID=['SQLi] http://lythgoes.net/genealogy/timeline2.php?primaryID=['SQLi] http://henrygrowfamily.org/timeline2.php?primaryID=['SQLi] http://www.ennever.com/timeline2.php?primaryID=['SQLi] http://mcbridehistory.com/timeline2.php?primaryID=['SQLi] ... etc ...


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top