################################################################################??########
8 |% m. Q0 m0 m& O( J2 u {# ' I. F$ F* N+ x2 a8 [8 G& T: V9 Q: c
# Exploit Title : Net Ways Cms Sql Injection Vulnerability 9 i: ^! p8 Q T
# 9 B. Z; r; N, z7 F
# Author : IrIsT.Ir
5 d. z) R1 ^5 C; {# 5 U) r' |: M, i3 D2 v, H
# Discovered By : Am!r
6 [7 R- z0 \6 G6 F; {' w( V, ?6 Q# 8 U8 P- V- I1 P* C7 z/ E4 U
# Home : http://IrIsT.Ir/forum - Q# G: h: u/ N
# 4 O0 A, g& e1 U
# Software Link : http://www.netways.com/ www.political-security.com# K$ r* @: i0 _6 C# w
#
5 z# K+ |, [& I) p- N3 M& D( H# Security Risk : High
}" p w, m) }* ~/ l$ |# $ T0 Q: C, P7 T' W' ?
# Version : All Version , N; g& z0 c9 U* Q, @# H5 P
# 9 L' _' b" E: B2 L% C. [
# Tested on : GNU/Linux Ubuntu - Windows Server - win7 0 k2 |. N7 C3 y/ [8 ]# P
# + |' ]" V- d9 ]* k" i1 ?' l+ _+ N
# Dork : intext:"Designed & developed by NetWays" ; u) u4 F9 b3 Y4 n
#
0 s% l9 }3 q( T7 p: _################################################################################??######## : M# q, Z( d' f1 T9 {7 s+ ?7 H
#
9 @. w, q! [) s; Q- S8 n! G. h# Expl0iTs :
( ~: k# C1 _/ l: P0 r# 4 U& \: F' v3 S
# http://target.com/news.php?id=[Sql]
8 p, D' W4 j6 [2 F2 g# & Q1 ]" w/ K$ K$ |2 o X: F
#
% N! ~" |3 X. _' a+ Q# u+ l3 }# D3mo :
: {2 {1 r, a) J5 O# 9 }8 S9 V1 K6 X
# http://compagnieparento.com/news.php?id=7[Sql]
- A4 \/ M% O. w- Q" Z- T# 2 H6 J' `6 z- a9 v- d
################################################################################??########
# a1 b, P, f7 O- ~# 4 L5 v! }; }/ c0 \& g1 Z+ ]" b
# Greats : B3HZ4D - nimaarek - Dead.Zone - C0dex - SpooferNinja - TaK.FaNaR - Nafsh - BestC0d3r
+ i& W" m( T3 l* k#
) o6 {; F S `& K9 J$ `) K6 a# 0x0ptim0us - TaK.FaNaR - m3hdi - F@rid - Siamak.Black - H4x0r - dr.tofan - skote_vahshat - d3c0d3r 7 n4 O" c; W# ^! P+ Q
# : ~$ Q4 S; A ?/ @
# Mr.Xpr & M.R.S.CO & Mr.Cicili & H-SK33PY & All Members In Www.IrIsT.Ir/forum
W0 h) E, b7 A( _7 X$ v+ ` M#
! x+ I# M. E0 F) |################################################################################??######## |