Exploitation
Since the page does appear to be on the older side I have attemped default password credentials, such as admin admin, admin password, root password to no avail. The next step is an SQL injection.
Using SQLmap:
login.req file includes:
It appears that the username is injectable.
Changing the username parameter to
bypasses the login functionality. This is because the sql statement:
As you can see when we add the '-- - to the username field we are commenting out the AND password='password' statement.
Testing the application, we can see that we can execute code.
Getting a Reverse Shell
Last updated
Was this helpful?