PCS B2B Script SQL İnjections

2018.01.15
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: PCS B2B Script SQL İnjections # Date: 14.01.2018 # Exploit Author: Ozan Agdepe # Email: agdepeozan[at]gmail[dot]com # Author twitter: twitter.com/OAdepe # Author GitHub: https://github.com/0z4nAgd3p3 # # # Google Dork: N/A # Vendor Homepage: http://www.pringlepcs.co.uk # Demo:http://www.renaultclaims.co.uk/ # Demo2: http://www.gekkoelite.co.uk/SR01_Login.aspx # Tested on: KaliLinux_X64/ Win 7-8-10_x64 # # # Description: # An attacker can exploit this vulnerability to read from the B2B database. # The vulnerability allows an attacker to inject sql commands.... # #Exploit: # SQL Injection Type: ByPass SQL İnjections # Payload: B2B Panel use ByPass SQL incetions command " 1'or'1'='1 "


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top