Пожалуйста, обратите внимание, что пользователь заблокирован
I've tried everything. I have information on the target machine, I've tried Cloudflare WAF bypass and alternative SQL commands. My goal is to get rid of the database. It's not possible to scrap the information because the maximum user returned is 1200, even though there are more with those words. The vulnerable search request is not XHR, i.e. the page is refreshed and php returns the data.
More details
- All the information about the Target Machine and its Structure: https://files.offshore.cat/jHIKW6UD.png
1. I tried to search “Edineide” and it searched normally, these were the results: https://files.offshore.cat/X9qqqF5L.png
2. I tried searching for just one ' (just one quotation mark), and it returned this: https://files.offshore.cat/p56pPzLs.png
3. Seeing that I was vulnerable, I tried searching “OR 1=1” and it returned the CF WAF error: https://files.offshore.cat/jWTmFc4X.png
4. I wanted to try a longer command, but the input had a limit, so I inspected the element by changing the maxLength value: https://files.offshore.cat/k2VOwhT5.png
5. When I ran the command, it again returned the CF WAF: https://files.offshore.cat/lpLJ53sW.png
Command:
(select(@x)from(select(@x:=''),
(select(1)from(information_schema.columns)
where(@x)in(@x:=concat(@x,table_name,0x3a,
column_name,0x3c62723e))))a)
6. I tried to code my command to bypass the CF WAF, but before returning, the server checks the amount of input, where the maximum is 50. They rejected our request: https://files.offshore.cat/sdGvOZnu.png
7. I tried smaller critical commands but when they were no longer than 50 characters, they were blocked by the WAF and when I managed to get around it, it returned the usual admin page with the message “No records found in the table” (https://files.offshore.cat/nlCCmn8f.png), that sinister error screen (https://files.offshore.cat/p56pPzLs.png) or it returned all the users, but only 1200 from the database, which is the maximum that php was configured to return.
I don't know what else to do, what to test, I'm in the dark. My only goal is to get access to the machine and/or dump the database. It seems so close but at the same time so far away... It's a strong feeling of helplessness, haha
More details
- All the information about the Target Machine and its Structure: https://files.offshore.cat/jHIKW6UD.png
1. I tried to search “Edineide” and it searched normally, these were the results: https://files.offshore.cat/X9qqqF5L.png
2. I tried searching for just one ' (just one quotation mark), and it returned this: https://files.offshore.cat/p56pPzLs.png
3. Seeing that I was vulnerable, I tried searching “OR 1=1” and it returned the CF WAF error: https://files.offshore.cat/jWTmFc4X.png
4. I wanted to try a longer command, but the input had a limit, so I inspected the element by changing the maxLength value: https://files.offshore.cat/k2VOwhT5.png
5. When I ran the command, it again returned the CF WAF: https://files.offshore.cat/lpLJ53sW.png
Command:
(select(@x)from(select(@x:=''),
(select(1)from(information_schema.columns)
where(@x)in(@x:=concat(@x,table_name,0x3a,
column_name,0x3c62723e))))a)
6. I tried to code my command to bypass the CF WAF, but before returning, the server checks the amount of input, where the maximum is 50. They rejected our request: https://files.offshore.cat/sdGvOZnu.png
7. I tried smaller critical commands but when they were no longer than 50 characters, they were blocked by the WAF and when I managed to get around it, it returned the usual admin page with the message “No records found in the table” (https://files.offshore.cat/nlCCmn8f.png), that sinister error screen (https://files.offshore.cat/p56pPzLs.png) or it returned all the users, but only 1200 from the database, which is the maximum that php was configured to return.
I don't know what else to do, what to test, I'm in the dark. My only goal is to get access to the machine and/or dump the database. It seems so close but at the same time so far away... It's a strong feeling of helplessness, haha