exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 16,751 RSS Feed

SQL Injection Files

TYPO3 News Module SQL Injection
Posted Aug 31, 2024
Authored by Charles FOL, Marco Rivoli | Site metasploit.com

This Metasploit module exploits a SQL Injection vulnerability In TYPO3 NewsController.php in the news module 5.3.2 and earlier. It allows an unauthenticated user to execute arbitrary SQL commands via vectors involving overwriteDemand and OrderByAllowed. The SQL injection can be used to obtain password hashes for application user accounts. This Metasploit module has been tested on TYPO3 3.16.0 running news extension 5.0.0. This Metasploit module tries to extract username and password hash of the administrator user. It tries to inject sql and check every letter of a pattern, to see if it belongs to the username or password it tries to alter the ordering of results. If the letter doesnt belong to the word being extracted then all results are inverted (News #2 appears before News #1, so Pattern2 before Pattern1), instead if the letter belongs to the word being extracted then the results are in proper order (News #1 appears before News #2, so Pattern1 before Pattern2).

tags | exploit, arbitrary, php, sql injection
advisories | CVE-2017-7581
SHA-256 | 472f7767d1d622fc181d7fa0a90d223e85f29ef884a67376c132a17b0cf4808e
Fortra FileCatalyst Workflow SQL Injection
Posted Aug 31, 2024
Authored by Michael Heinzl, Tenable | Site metasploit.com

This Metasploit module exploits a SQL injection vulnerability in Fortra FileCatalyst Workflow less than or equal to v5.1.6 Build 135, by adding a new administrative user to the web interface of the application.

tags | exploit, web, sql injection
advisories | CVE-2024-5276
SHA-256 | 1156e7ce3120c4d6f108a0801b0bdca55b989aecbf8c92115bba574b28955c49
WordPress Symposium Plugin SQL Injection
Posted Aug 31, 2024
Authored by Matteo Cantoni, PizzaHatHacker | Site metasploit.com

This Metasploit module exploits a SQL injection vulnerability in the WP Symposium plugin before 15.8 for WordPress, which allows remote attackers to extract credentials via the size parameter to get_album_item.php.

tags | exploit, remote, php, sql injection
advisories | CVE-2015-6522
SHA-256 | 2961b2a6386f280ff2a5c8a22286ae6b39869c94cfc164ff4f01d0e67ea4a838
ManageEngine Password Manager SQLAdvancedALSearchResult.cc Pro SQL Injection
Posted Aug 31, 2024
Authored by Pedro Ribeiro | Site metasploit.com

ManageEngine Password Manager Pro (PMP) has an authenticated blind SQL injection vulnerability in SQLAdvancedALSearchResult.cc that can be abused to escalate privileges and obtain Super Administrator access. A Super Administrator can then use his privileges to dump the whole password database in CSV format. PMP can use both MySQL and PostgreSQL databases but this module only exploits the latter as MySQL does not support stacked queries with Java. PostgreSQL is the default database in v6.8 and above, but older PMP versions can be upgraded and continue using MySQL, so a higher version does not guarantee exploitability. This Metasploit module has been tested on v6.8 to v7.1 build 7104 on both Windows and Linux. The vulnerability is fixed in v7.1 build 7105 and above.

tags | exploit, java, sql injection
systems | linux, windows
advisories | CVE-2014-8499
SHA-256 | 3bb1458e9aceabbc6baaf58c805fc36d04c4e787a9a2a98f33a3d697bff053f3
Microsoft SQL Server SQL Injection NTLM Stealer
Posted Aug 31, 2024
Authored by Antti, nullbind | Site metasploit.com

This Metasploit module can be used to help capture or relay the LM/NTLM credentials of the account running the remote SQL Server service. The module will use the SQL injection from GET_PATH to connect to the target SQL Server instance and execute the native "xp_dirtree" or stored procedure. The stored procedures will then force the service account to authenticate to the system defined in the SMBProxy option. In order for the attack to be successful, the SMB capture or relay module must be running on the system defined as the SMBProxy. The database account used to connect to the database should only require the "PUBLIC" role to execute. Successful execution of this attack usually results in local administrative access to the Windows system. Specifically, this works great for relaying credentials between two SQL Servers using a shared service account to get shells. However, if the relay fails, then the LM hash can be reversed using the Halflm rainbow tables and john the ripper.

tags | exploit, remote, shell, local, sql injection
systems | windows
SHA-256 | 07d8028c67f4c74422fce026d3e4f7c8c01787a332652cb8847f7c5bc5571deb
Microsoft SQL Server SQL Injection SUSER_SNAME Windows Domain Account Enumeration
Posted Aug 31, 2024
Authored by Antti, nullbind | Site metasploit.com

This Metasploit module can be used to bruteforce RIDs associated with the domain of the SQL Server using the SUSER_SNAME function via Error Based SQL injection. This is similar to the smb_lookupsid module, but executed through SQL Server queries as any user with the PUBLIC role (everyone). Information that can be enumerated includes Windows domain users, groups, and computer accounts. Enumerated accounts can then be used in online dictionary attacks. The syntax for injection URLs is: /testing.asp?id=1+and+1=[SQLi];--.

tags | exploit, sql injection, asp
systems | windows
SHA-256 | 0e0cd7442b34141ce286901bcc638f36f8b80933c0544ac4a91ea1079c35aa1f
Microsoft SQL Server SQL Injection Escalate Db_Owner
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module can be used to escalate SQL Server user privileges to sysadmin through a web SQL Injection. In order to escalate, the database user must to have the db_owner role in a trustworthy database owned by a sysadmin user. Once the database user has the sysadmin role, the mssql_payload_sqli module can be used to obtain a shell on the system. The syntax for injection URLs is: /testing.asp?id=1+and+1=[SQLi];--.

tags | exploit, web, shell, sql injection, asp
SHA-256 | 2281ffe74b82b6590851bcfd613e9b6b34e0e85e927c0a4615fce7723f578db3
Microsoft SQL Server SQL Injection Escalate Execute AS
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module can be used escalate privileges if the IMPERSONATION privilege has been assigned to the user via error based SQL injection. In most cases, this results in additional data access, but in some cases it can be used to gain sysadmin privileges. The syntax for injection URLs is: /testing.asp?id=1+and+1=[SQLi];--.

tags | exploit, sql injection, asp
SHA-256 | d50e06d93b9cce5b4eedb05759e46b1ef7a302db4d0689fb0404c274fc0ff5d2
Advantech WebAccess DBVisitor.dll ChartThemeConfig SQL Injection
Posted Aug 31, 2024
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a SQL injection vulnerability found in Advantech WebAccess 7.1. The vulnerability exists in the DBVisitor.dll component, and can be abused through malicious requests to the ChartThemeConfig web service. This Metasploit module can be used to extract the site and project usernames and hashes.

tags | exploit, web, sql injection
advisories | CVE-2014-0763
SHA-256 | 08cbf9636cf1774ffb0ae21e481e4e9ea1bc079a6c23430561e43b5bfd796d44
OpenEMR 5.0.1 Patch 6 SQL Injection
Posted Aug 31, 2024
Authored by Will Porter | Site metasploit.com

This Metasploit module exploits a SQL injection vulnerability found in OpenEMR versions 5.0.1 Patch 6 and lower. The vulnerability allows the contents of the entire database (with exception of log and task tables) to be extracted. This Metasploit module saves each table as a .csv file in your loot directory and has been tested with OpenEMR 5.0.1.

tags | exploit, sql injection
advisories | CVE-2018-17179
SHA-256 | 066eeb43c6b2d8cd952b1105cfaa25528d4595e183b0c2660a66717e9f8a976c
Oracle DB SQL Injection In MDSYS.SDO_TOPO_DROP_FTBL Trigger
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module will escalate an Oracle DB user to MDSYS by exploiting a sql injection bug in the MDSYS.SDO_TOPO_DROP_FTBL trigger. After that exploit escalate user to DBA using "CREATE ANY TRIGGER" privilege given to MDSYS user by creating evil trigger in system scheme (2-stage attack).

tags | exploit, sql injection
advisories | CVE-2008-3979
SHA-256 | 91a0457e6fc1353dda1d938850804c7fbf4f3873992700b019c47715d498af97
Oracle DB SQL Injection Via SYS.DBMS_CDC_IPUBLISH.ALTER_HOTLOG_INTERNAL_CSOURCE
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

The module exploits an sql injection flaw in the ALTER_HOTLOG_INTERNAL_CSOURCE procedure of the PL/SQL package DBMS_CDC_IPUBLISH. Any user with execute privilege on the vulnerable package can exploit this vulnerability. By default, users granted EXECUTE_CATALOG_ROLE have the required privilege. Affected versions: Oracle Database Server versions 10gR1, 10gR2 and 11gR1. Fixed with October 2008 CPU.

tags | exploit, sql injection
advisories | CVE-2008-3996
SHA-256 | 531bca332b7b8919c806ed365e8ad1c5e5000249344fccaf602038718feac7e5
Oracle DB SQL Injection Via SYS.DBMS_METADATA.GET_GRANTED_XML
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module will escalate an Oracle DB user to DBA by exploiting a sql injection bug in the SYS.DBMS_METADATA.GET_GRANTED_XML package/function.

tags | exploit, sql injection
SHA-256 | 47ba8aeb06908edd303259a2080cba7efcaa98f8f66c52b0fa64a15448287fe5
Oracle DB SQL Injection Via SYS.DBMS_METADATA.OPEN
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module will escalate a Oracle DB user to DBA by exploiting an sql injection bug in the SYS.DBMS_METADATA.OPEN package/function.

tags | exploit, sql injection
SHA-256 | f6664ac501c9f358d8d4a9410aab3c277a77640982c29a4ac936ead1bc75e8b3
Oracle DB SQL Injection Via SYS.DBMS_CDC_PUBLISH.DROP_CHANGE_SOURCE
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

The module exploits an sql injection flaw in the DROP_CHANGE_SOURCE procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege on the vulnerable package can exploit this vulnerability. By default, users granted EXECUTE_CATALOG_ROLE have the required privilege.

tags | exploit, sql injection
advisories | CVE-2010-0870
SHA-256 | 7e5369ebdc4bfc61aa262475859d683b00bf47b5e34f9da7b3872e8242c9834c
Oracle DB SQL Injection Via SYS.LT.REMOVEWORKSPACE
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits a sql injection flaw in the REMOVEWORKSPACE procedure of the PL/SQL package SYS.LT. Any user with execute privilege on the vulnerable package can exploit this vulnerability.

tags | exploit, sql injection
advisories | CVE-2008-3984
SHA-256 | 27f5ae57e22ed3cfd2e38c06ca48a65e3dfb8c76f9cc56d51d4721d34c60da9c
Oracle DB SQL Injection Via DBMS_EXPORT_EXTENSION
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module will escalate an Oracle DB user to DBA by exploiting a sql injection bug in the DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA package. Note: This Metasploit module has been tested against 9i, 10gR1 and 10gR2.

tags | exploit, sql injection
advisories | CVE-2006-2081
SHA-256 | 45e22b08a22f5b9b513570650ac77c9b7cf896df1dddb9d97cc0659722506344
Oracle DB SQL Injection Via SYS.DBMS_METADATA.GET_XML
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module will escalate an Oracle DB user to DBA by exploiting a sql injection bug in the SYS.DBMS_METADATA.GET_XML package/function.

tags | exploit, sql injection
SHA-256 | 345c6446dfe846a011460df72073d8ff0549b8076c977837fb20c1f2ddb07dd3
Oracle DB SQL Injection Via SYS.LT.COMPRESSWORKSPACE
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits an sql injection flaw in the COMPRESSWORKSPACE procedure of the PL/SQL package SYS.LT. Any user with execute privilege on the vulnerable package can exploit this vulnerability.

tags | exploit, sql injection
advisories | CVE-2008-3982
SHA-256 | 8d3bbc62256bcef0370fd324d79badfe6dada95158c7b728fcf20137808677d2
Oracle DB SQL Injection Via SYS.LT.FINDRICSET Evil Cursor Method
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module will escalate an Oracle DB user to DBA by exploiting a sql injection bug in the SYS.LT.FINDRICSET package via Evil Cursor technique. Tested on oracle 10.1.0.3.0 -- should work on thru 10.1.0.5.0 and supposedly on 11g. Fixed with Oracle Critical Patch update October 2007.

tags | exploit, sql injection
advisories | CVE-2007-5511
SHA-256 | c969f6f19cf659e35b78bffa83fbc8e8694a50647075c02b8636a5ef97eb6c17
Oracle DB SQL Injection Via SYS.LT.ROLLBACKWORKSPACE
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits a sql injection flaw in the ROLLBACKWORKSPACE procedure of the PL/SQL package SYS.LT. Any user with execute privilege on the vulnerable package can exploit this vulnerability.

tags | exploit, sql injection
advisories | CVE-2009-0978
SHA-256 | ccfe06863fa08c66b4bb04f888a3c40c6a7660aa2a9948479455b087d102bc4d
Oracle DB SQL Injection Via SYS.LT.MERGEWORKSPACE
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits a sql injection flaw in the MERGEWORKSPACE procedure of the PL/SQL package SYS.LT. Any user with execute privilege on the vulnerable package can exploit this vulnerability.

tags | exploit, sql injection
advisories | CVE-2008-3983
SHA-256 | 25265a201b6de9b641b309ca9d9e2f86d75f62ec4113d2e80983a1052506dbe8
Oracle DB SQL Injection Via SYS.DBMS_CDC_SUBSCRIBE.ACTIVATE_SUBSCRIPTION
Posted Aug 31, 2024
Authored by Esteban Martinez Fayo, juan vazquez | Site metasploit.com

This Metasploit module will escalate an Oracle DB user to DBA by exploiting a sql injection bug in the SYS.DBMS_CDC_SUBSCRIBE.ACTIVATE_SUBSCRIPTION package/function. This vulnerability affects to Oracle Database Server 9i up to 9.2.0.5 and 10g up to 10.1.0.4.

tags | exploit, sql injection
advisories | CVE-2005-4832
SHA-256 | dc9b1de7a0efe0b6df96fb180a6432e4861fefcaaceb66899e1acdd5821ec707
Oracle DB SQL Injection Via SYS.DBMS_CDC_PUBLISH.ALTER_AUTOLOG_CHANGE_SOURCE
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

The module exploits an sql injection flaw in the ALTER_AUTOLOG_CHANGE_SOURCE procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege on the vulnerable package can exploit this vulnerability. By default, users granted EXECUTE_CATALOG_ROLE have the required privilege. Affected versions: Oracle Database Server versions 10gR1, 10gR2 and 11gR1. Fixed with October 2008 CPU.

tags | exploit, sql injection
advisories | CVE-2008-3995
SHA-256 | 14b30e15660808395b533ff80a789b56b79cedf1bffaa219897f461a53b655dc
Oracle DB SQL Injection Via SYS.DBMS_CDC_PUBLISH.CREATE_CHANGE_SET
Posted Aug 31, 2024
Authored by Jay Turla | Site metasploit.com

The module exploits an sql injection flaw in the CREATE_CHANGE_SET procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege on the vulnerable package can exploit this vulnerability. By default, users granted EXECUTE_CATALOG_ROLE have the required privilege.

tags | exploit, sql injection
advisories | CVE-2010-2415
SHA-256 | 26ed86f78f01db48be7f14a8b9f1b9fec76717709540eee30aa0dfa68088569f
Page 4 of 670
Back23456Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close