SebracCMS
SebracCMS contains two major SQL injection vulnerabilities: Unsanitazed POST-variables in SQL queries when logging users in. This allows login access without proper credentials. And unsanitized GET-variables in SQL queries when loading articles. This allows an attacker to read all usernames and passwordhashes in the database. Using admin' OR '1'='1 as the username will allow login without proper registered credentials. The second and far more serious SQL Injection is in cms/form/read.php. This vulnerability allows an attacker to reveal all users and their md5-password hashes. Using 1' UNION ALL SELECT uname, uname, uname, pw, uname FROM sbc_user WHERE '1'='1 as the GET-variable 'recid' reveals the first post along with all registered users and their passwordhashes.