header-logo
Suggest Exploit
vendor:
phpMyRealty
by:
H4T$A
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpMyRealty
Affected Version From: 1.0.7
Affected Version To: 1.0.7
Patch Exists: NO
Related CWE: N/A
CPE: a:phpmyrealty:phpmyrealty:1.0.7
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: All versions are vulnerable
2011

phpMyRealty <= v. 1.0.7 SQL Injection Vulnerability

A SQL injection vulnerability exists in phpMyRealty version 1.0.7. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

Mitigation:

Developers should always sanitize user input to prevent SQL injection attacks. Additionally, developers should use parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

|=========================================================================================|
# Exploit Title: [phpMyRealty <= v. 1.0.7 SQL Injection Vulnerability]
# Google Dork: [intext:Sort By: Submission Date | Bedrooms | Bathrooms | 
Price (ASC) | Price (DESC)]
# Date: [19-8-2011]
# Author: [H4T$A]
# Software Link: [http://www.phpmyrealty.com/]
# Version: [v. 1.0.7]
# Tested on: [all versions are Vulnerability]
# |Contact:newboy62@live.com
#Gr33tz f0r th3 >> best egyption hacker >>> H4T$A
||=========================================================================================

Exploit :
       http://www.website.com/search.php?seed=640'

you can use Haivj SQL injection tool the easiest way to work with the 
exploit :)

remember you will change the link to >> ||search.php?seed=-640||before 
start using Haivj :)

||=========================================================================================|