Advertisement
zeeshan-haxor-zesn

New Exploit XCOMM Sql Injection

Dec 14th, 2015
323
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.77 KB | None | 0 0
  1. Exploit Title: XCOMM Sql Injection
  2. "Google Dork: inurl:?id= "Designed & Developed by: XCOMM
  3. Date: 24/09/2015
  4. Exploit Author: Houssem_Rx
  5. /Vendor Homepage: http://xcomm.net.pk
  6. Version: All Versions
  7. CVE: N/A
  8. Category: webapps
  9. Tested on: Windows 7
  10. +----------------------+
  11. Exploitation Details
  12. +----------------------+
  13. Normal user can inject sql query in the url which lead to read data from the database.
  14. ----------------------+
  15. Proof of Concept
  16. +----------------------+
  17. Find any file with ?id= or with = and simply add ' .all files are vulnerable.
  18. Examples:
  19. http://target.com/file_name?id=1
  20. http://target.com/text.php?TID=1 then add '
  21. +----------------------+
  22. Login
  23. +----------------------+
  24. http://target.com/admin/
  25. Or use Your Mind wink emoticon
  26. β€ͺ#β€ŽEnjoy‬ . .
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement