Enviar #26: The Next Generation of Genealogy Sitebuilding SQL Injection Vulnerabilityinformación

TítuloThe Next Generation of Genealogy Sitebuilding SQL Injection Vulnerability
Descripción========================================================================================== The Next Generation of Genealogy Sitebuilding SQL Injection Vulnerability ========================================================================================== :-------------------------------------------------------------------------------------------------------------------------: : # Exploit Title : The Next Generation of Genealogy Sitebuilding SQL Injection Vulnerability : # Date : 29th August 2017 : # Author : X-Cisadane : # CMS Name : The Next Generation of Genealogy Sitebuilding : # Version : < 11.1.1 : # CMS Developer : http://www.tngsitebuilding.com/ : # Category : Web Application : # Vulnerability : SQL Injection : # Tested On : SQLMap x.x.x.x#dev (Windows 7 64-bit) : # Greetz to : X-Code YogyaFree, ExploreCrew, CodeNesia, Bogor Hackers Community, Borneo Crew, Depok Cyber, Mantan :-------------------------------------------------------------------------------------------------------------------------: A SQL Injection Vulnerability has been discovered in the The Next Generation of Genealogy Sitebuilding CMS. The vulnerability allows remote attackers to execute own SQL Commands by usage of a vulnerable serivce value. The vulnerability is located in the primaryID value of the timeline2.php file. Remote attackers are able to execute own SQL Commands by usage of a GET method request with manipulated primaryID value. Remote attackers are able to read database information by execution of own SQL Commands. DORKS (How to find the target) : ================================ inurl:/timeline2.php?primaryID= Or "powered by The Next Generation of Genealogy Sitebuilding" Or use your own Google Dorks :) Proof of Concept ================ SQL Injection PoC : http://[Site]/[Path]/timeline2.php?primaryID=['SQLi] Screenshot (PoC) : https://s20.postimg.org/asdu29rwt/Screenshot_99.png https://s20.postimg.org/wsu6iwakt/Screenshot_100.png Example of Vuln Sites : http://1820settlers.co.uk/genealogy/timeline2.php?primaryID=['SQLi] http://lythgoes.net/genealogy/timeline2.php?primaryID=['SQLi] http://henrygrowfamily.org/timeline2.php?primaryID=['SQLi] http://www.ennever.com/timeline2.php?primaryID=['SQLi] http://mcbridehistory.com/timeline2.php?primaryID=['SQLi] ... etc ...
Fuente⚠️ http://1820settlers.co.uk/genealogy/timeline2.php?primaryID=%27I5880&tree=master&chartwidth=
Usuario
 X-Cisadane (UID 172)
Sumisión2017-08-29 04:36 (hace 9 años)
Moderación2017-08-29 11:33 (7 hours later)
EstadoAceptado
Entrada de VulDB105833 [The Next Generation of Genealogy Sitebuilding hasta 11.1.0 /timeline2.php primaryID inyección SQL]
Puntos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!