CMS Poweres by Oyabunstyle.de SQL Injection

2017.11.06
Credit: Bl4ck M4n
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |--------------------------------------------------------------[+] |[+] Exploit Title: CMS Poweres by Oyabunstyle.de SQL Injection |[+] |[+] Exploit Author: Bl4ck M4n |[+] |[+] Sit: und3rgr0und |[+] |[+] Google Dork: N/A |[+] |[+] Vendor site: http://sainahotel.com |[+] |[+] |[+] Tested on: Windows 7 , parrot os |[+] |[+] |------------------------------------------------------------[+] |[+] Demo: |[+] |[+] http://sainahotel.com/plugins/ppgallery/image.php?id=2%27 |[+]-------------------------------------------[+] |[+] Twitter : M4nBl4ck |[+] |[+] Amir / Bl4ck M4n / S3c_T0r / <!-Mr.PHoemix--> / Black N3t |[+] |[+] tnx: www.exploit4arab.org www.bugsearch.net www.iedb.ir |[+] |[+] And All Member In Arbi AND Iranian |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top