Submit #499115: benner modernanet < 1.1.1 Blind Boolean-Based SQL Injectioninfo

Titlebenner modernanet < 1.1.1 Blind Boolean-Based SQL Injection
DescriptionTitle: Blind Boolean-Based SQL Injection in ModernaNet by Benner (< 1.1.1) Vendor: Benner Affected Product: ModernaNet Affected Versions: < 1.1.1 Vulnerability Type: Blind Boolean-Based SQL Injection CVSS Score: 7.5 Summary: A Blind Boolean-Based SQL Injection vulnerability has been identified in the ModernaNet system by Benner, affecting versions prior to 1.1.1. The vulnerability exists in the additionalCondition parameter of the following endpoint: /Home/JS_CarregaCombo?formName=DADOS_PESSOAIS_PLANO&additionalCondition=&insideParameters=&elementToReturn=DADOS_PESSOAIS_PLANO&ordenarPelaDescricao=true&direcaoOrdenacao=asc&_=1739290047295 An attacker can exploit this vulnerability to infer database information using Boolean-based SQL Injection techniques. Exploitation: The vulnerability can be exploited using the following payload: 1=1) AND (CASE WHEN (SUBSTRING(DB_NAME(),X,1)='Y') THEN 1 ELSE 0 END=1)-- If the query is correct, the response length is greater. If not, the response length is smaller. This allows an attacker to extract database information one character at a time, its just needed to change the argument X to the database name index and Y to the character. Impact: No authentication or privileges are required. The attack can be performed remotely. The attacker can infer database schema details, potentially leading to further exploitation. CVSS recomendation: 7.5 (HIGH) Credits: This vulnerability was discovered by Yago Martins and Yasmim da Cunha.
Source⚠️ https://github.com/yago3008/CVES
User
 y4g0 (UID 80480)
Submission02/12/2025 01:50 AM (3 months ago)
Moderation02/24/2025 06:22 PM (13 days later)
StatusAccepted
VulDB Entry296690 [Benner ModernaNet up to 1.1.0 sql injection]
Points20

Interested in the pricing of exploits?

See the underground prices here!