Transinfo Solutions SQL Injection

2020.05.05
ir h4shur (IR) ir
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

[+] Title: Transinfo Solutions SQL Injection [+] Author: h4shur [+] date:2020-05-04 [+] Vendor Homepage: transinfosolutions.com [+] Software Link: transinfosolutions.com [+] Tested on: Windows 10 & Google Chrome [+] Category : Web Application Bugs [+} Dork : intext:"Powered By: Transinfo Solutions" intext:"Powered By: Transinfo Solutions" inurl:.php?id= ### Note: [+] Add the quotation mark (') to the end of the link : * Target.com/news-detail.php?newsId=4' [+] First add "and 1 = 1" and then "and 1 = 2" to the end of the link : * Target.com/news-detail.php?newsId=4 and 1=1 * Target.com/news-detail.php?newsId=4 and 1=2 ### Demo: [+] http://hotelspringburn.com/gallery.php?id=2 ### Contact Me : * Telegram : @h4shur * Email : h4shursec@gmail.com * Instagram : @netedit0r * twitter : @h4shur


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top