header-logo
Suggest Exploit
vendor:
Geomi CMS
by:
ThunDEr HeaD
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Geomi CMS
Affected Version From: 1.2
Affected Version To: 3
Patch Exists: NO
Related CWE: N/A
CPE: a:tridan_it:geomi_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: PBL Technology
2011

Geomi CMS by Tridan IT [ Sql Injection Vunerability ]

A SQL injection vulnerability was discovered in Geomi CMS by Tridan IT. The vulnerability exists in the cms.php file, where an attacker can inject malicious SQL code into the categoryid parameter. This can be exploited to gain access to the database and potentially execute arbitrary code.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

#########################################################################
 
[+] Exploit Title : Geomi CMS by Tridan IT [ Sql Injection Vunerability ] 
[~] Author : ThunDEr HeaD
[~] Contact : thunderhead10@gmail.com
[~] Date : 11-01-2011
[~] HomePage : www.indishell.in
[~] Version : 1.2 , 3.0
[~] Tested on : PBL Technology 
[~] Vulnerability Style : PHPCMS [ Sql Injection Vunerability ] 
[~] Vendor: http://we.are.tridan.it/
#########################################################################

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
<3 Love: -[SiLeNtp0is0n]-, stRaNgEr(lucky), inX_rOot, NEO H4cK3R, DarkL00k, Th3 RDX, G00g!3 W@rr!0r, Mahi ,
eXeSoul, str1k3r, co0Lt04d , ATUL DWIVEDI , Jackh4xor
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                           ......\m/ INDIAN CYBER ARMY \m/......
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



Vulnerability:
 
*SQL injection Vulnerability*


[#] http://server/cms.php?categoryid=10

[#] http://server/cms.php?categoryid=[SQLi]




-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
=> PROUD TO BE AN INDIAN | Anythning for INDIA | JAI-HIND | Maa Tujhe Salam
  
=> c0d3 for motherland, h4ck for motherland
 

     
     Enj0y! :D


[#] DOne now time to rock \m/
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Bug discovered : 11 feb 2011
 
finish(0);
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 
#End 0Day#