TutorialCMS <= 1.00 SQL Injection Exploit
The exploit allows an attacker to retrieve the admin username and hash by exploiting a SQL injection vulnerability in TutorialCMS version 1.00. The vulnerable code is in the 'search.php' file where the 'search' parameter is not properly sanitized and is directly used in a SQL query. By injecting a specially crafted SQL query, an attacker can retrieve the admin username and hash from the 'users' table. The exploit can be triggered by accessing the 'search.php' page with the payload: 'search=' UNION SELECT 0,0,0,0,username,password,0,0,0,0,0,0,0 FROM users WHERE id='1' /*'. It is important to note that the vulnerability can only be exploited if the 'magic_quotes_gpc' configuration is set to 'off'. The exploit also mentions that all the parameters mentioned (browseCat.php, browseSubCat.php, openTutorial.php, topFrame.php, admin/editListing.php) are also vulnerable to XSS attacks.