exploit-db-mirror/exploits/php/webapps/44868.txt
Offensive Security 1877107e5a DB: 2018-06-12
11 changes to exploits/shellcodes

WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' DoS

WampServer 3.0.6 - Cross-Site Request Forgery
Schools Alert Management Script - SQL Injection
WordPress Plugin Pie Register < 3.0.9 - Blind SQL Injection
Event Manager Admin panel - 'events_new.php' SQL injection
Joomla! Component EkRishta 2.10 - 'cid' SQL Injection
Schools Alert Management Script - Arbitrary File Deletion
userSpice 4.3.24 - 'X-Forwarded-For' Cross-Site Scripting
userSpice 4.3.24 - Username Enumeration
Schools Alert Management Script - 'get_sec.php' SQL Injection
Schools Alert Management Script - Arbitrary File Read
2018-06-12 05:01:49 +00:00

23 lines
No EOL
939 B
Text

# Exploit Title: Event Manager PHP Script Admin panel - 'events_new.php' SQL injection
# Date: 2018-06-10
# Exploit Author: telahdihapus
# Vendor Homepage: https://codecanyon.net/user/ezcode
# Software Link: https://codecanyon.net/item/eventmanager-php-script-admin-panel/21280741
# Tested on: windows 10
# 1. description :
# Insert data in events_new.php do not use escape string function,
# so attacker can put qoute character and inject query in insert data.
# 2. POC :
login in admin page http://victim.com/cms/, or you can register admin if you not have, register at http://victim.com/cms/register.
go to http://victim.com/cms/events_new.php
add new title, add some value and press "new type" button. you can see success notice.
now, add payload to value.
example payload = a'), (120, (select version()))-- -
120 is id, you can put your cursor in delete button, to see id, and you can prediction next id.