iCT Sky SQL Injection
2024-2-12 06:17:29 Author: cxsecurity.com(查看原文) 阅读量:19 收藏

# Exploit Title : iCT Sky SQL Injection # Google Dork : intext:"IT Partner iCT Sky" # Discovered By : MrHoudini # Contact Me : [email protected] # Date : 11-02-2024 # Vendor : https://ictsky.com/ [!] Description: SQL injection attacks usually targets database and all of them are the results of programming errors. If programmer couldn't checked the inputs correctly, so the attacker can send his/her commands to database. If programmer do this errors at admin page input and the inputs haven't been checked correctly, occur a very bad thing that allow attacker login to administrator panel with combination the passwords that turn the result to True in php. Request Method : [+] POST Vulnerable Module: [+] Login Vulnerable Parameter: [+](username) and (Password) ================================================== [!] Bug.........: <?php require_once('any.php'); if($_POST['submit']) { $user=$_POST['user']; $pswd=$_POST['pswd']; $result=mysql_query("select * from login where user='$user' and pswd='$pswd'"); $rowcount=mysql_num_rows($result); if($rowcount>0) { header('Location:any.php'); } else { echo "bad user"; } } ?> ================================================== [!] SQL Injection : Demo : https://www.faizaeltd.com/shop/category.php?id=3



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2024020046
如有侵权请联系:admin#unsafe.sh