############################################################################
# Exploit Title: *Php City Portal Script Software SQL Injection*
# Google Dork: *Powered by PHPCityPortal.com*
# Date: *Decembar/07/2011*
# Author: *Don (BalcanCrew & BalcanHack)*
# Software Link: *http://phpcityportal.com*
# Version: *1.1*
# Tested on: *Apache (Unix)*
############################################################################
# An attacker may execute arbitrary SQL statements on the vulnerable system.
# This may compromise the integrity of your database and/or expose
sensitive information.
############################################################################
*Attack details:*
URL encoded GET input userName was set to *1'*
Error message found: supplied argument is not a valid MySQL result
Vulnerability:
*http://localhost/phpcityportal/profile.php?userName= (SQL)*
*How to fix this vulnerability:*
Filter metacharacters from user input.
*NOTE!*
*You have to be logged in!*
~Don 2011