exploitdb
WORKING POC
by Daniele Scanu · pythonwebappsphp
https://www.exploit-db.com/exploits/46635
This exploit demonstrates an unauthenticated time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. It extracts sensitive information such as the admin password salt, username, email, and hashed password, with an optional brute-force cracking feature.
Classification
Working Poc 100%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation
nomisec
WORKING POC
10 stars
by e-renna · poc
https://github.com/e-renna/CVE-2019-9053
This is a Python 3 exploit for CVE-2019-9053, a time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. It dumps admin credentials (username, email, password hash, and salt) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
7 stars
by Mahamedm · poc
https://github.com/Mahamedm/CVE-2019-9053-Exploit-Python-3
This repository contains a Python 3 exploit for CVE-2019-9053, a time-based blind SQL injection vulnerability in CMS Made Simple (CMSMS) versions <= 2.2.9. The exploit extracts database information, including admin credentials, and optionally cracks password hashes using a provided wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple (CMSMS) <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
6 stars
by Dh4nuJ4 · poc
https://github.com/Dh4nuJ4/SimpleCTF-UpdatedExploit
This is a Python 3 exploit for CVE-2019-9053, a time-based SQL injection vulnerability in CMS Made Simple <= 2.2.10. It extracts admin credentials (salt, username, email, and password hash) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.10
No auth needed
Prerequisites:
Python 3.x · requests library · termcolor library · target URL
nomisec
WORKING POC
5 stars
by ELIZEUOPAIN · poc
https://github.com/ELIZEUOPAIN/CVE-2019-9053-CMS-Made-Simple-2.2.10---SQL-Injection-Exploit
This is a Python-based exploit for CVE-2019-9053, targeting an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. It extracts user credentials (username, email, password salt, and hashed password) via time-based blind SQL injection and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple instance · Optional wordlist for password cracking
nomisec
WORKING POC
3 stars
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/CVE-2019-9053
This is a Python-based exploit for CVE-2019-9053, a time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. It dumps admin credentials (username, email, password hash, and salt) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation · Optional wordlist for password cracking
nomisec
WORKING POC
1 stars
by JagdeepSinghCeh · poc
https://github.com/JagdeepSinghCeh/cms-made-simple-python3
This repository contains a Python3 exploit for CVE-2019-9053, an unauthenticated time-based SQL injection vulnerability in CMS Made Simple. The exploit extracts sensitive data such as admin credentials and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple ≤ 2.2.9
No auth needed
Prerequisites:
Target running vulnerable CMS Made Simple version · Network access to the target
nomisec
WORKING POC
1 stars
by Azrenom · poc
https://github.com/Azrenom/CMS-Made-Simple-2.2.9-CVE-2019-9053
This repository contains a Python 3 exploit for CVE-2019-9053, an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. The exploit retrieves admin credentials (username, email, hashed password, and salt) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Python 3.x · requests library · termcolor library · target URL
nomisec
WORKING POC
1 stars
by TeymurNovruzov · poc
https://github.com/TeymurNovruzov/CVE-2019-9053-python3-remastered
This is a Python 3 exploit for CVE-2019-9053, a time-based SQL injection vulnerability in CMS Made Simple. It dumps sensitive information such as salt, username, email, and password, with an optional password cracking feature.
Classification
Working Poc 95%
Target:
CMS Made Simple
No auth needed
Prerequisites:
Python 3.x · Requests library · Target URL
nomisec
WORKING POC
1 stars
by fernandobortotti · poc
https://github.com/fernandobortotti/CVE-2019-9053
This is a Python-based exploit for CVE-2019-9053, targeting a Time-Based Blind SQL Injection vulnerability in CMS Made Simple 2.2.8. It extracts sensitive information such as usernames, emails, password hashes, and salts, and optionally cracks the password using a provided wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple 2.2.8
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple instance · Optional wordlist for password cracking
nomisec
WORKING POC
1 stars
by d3athcod3 · poc
https://github.com/d3athcod3/46635.py_CVE-2019-9053
This repository contains a Python 3 port of an exploit for CVE-2019-9053, a vulnerability in ThinkPHP. The exploit is likely a remote code execution (RCE) payload, modified from its original Python 2 version.
Classification
Working Poc 80%
Target:
ThinkPHP (version not specified in provided files)
No auth needed
Prerequisites:
Target running vulnerable ThinkPHP version · Network access to the target
nomisec
WORKING POC
by coolkiee · poc
https://github.com/coolkiee/CVE-2019-9053
This repository contains a functional Python exploit for CVE-2019-9053, a time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. The exploit automates the extraction of admin credentials (username, email, password hash, and salt) and optionally cracks the password using a wordlist.
Classification
Working Poc 100%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
by iTzR1g · poc
https://github.com/iTzR1g/CVE-2019-9053
This repository contains a functional Python 3 exploit for CVE-2019-9053, an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. The exploit uses time-based SQLi to extract admin credentials (username, password hash, salt, and email) and includes improvements for stability and compatibility.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
target URL · optional wordlist for password cracking
nomisec
WORKING POC
by vadaysakiv · poc
https://github.com/vadaysakiv/cve-2019-9053
This repository contains a functional Python script that exploits CVE-2019-9053, a SQL injection vulnerability in CMS Made Simple. The script extracts sensitive information such as usernames, emails, password hashes, and salts using time-based blind SQL injection techniques.
Classification
Working Poc 95%
Target:
CMS Made Simple
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation
nomisec
WORKING POC
by pasan2002 · poc
https://github.com/pasan2002/CVE-2019-9053---CMS-Made-Simple-SQL-Injection-Exploit-Modified-
This is a modified Python exploit for CVE-2019-9053, an unauthenticated time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. It extracts credentials (salt, username, email, password hash) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Python 2.7 · requests library · target URL · optional wordlist for password cracking
nomisec
WORKING POC
by tim-karov · poc
https://github.com/tim-karov/cmsms-sqli
This is a Python3 exploit for CVE-2019-9053, a time-based blind SQL injection vulnerability in CMS Made Simple <= 2.2.9. It dumps admin credentials (username, salt, and MD5 password hash) via crafted payloads targeting the 'm1_idlist' parameter.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Network access to the target CMS Made Simple installation · Vulnerable endpoint '/moduleinterface.php' exposed
nomisec
WRITEUP
by Praditha29 · poc
https://github.com/Praditha29/Simple-CTF-THM-Writeup
This is a writeup detailing the exploitation of CVE-2019-9053 in CMS Made Simple 2.2.8, including steps for reconnaissance, directory enumeration, exploit execution, and privilege escalation via sudo permissions.
Classification
Writeup 100%
Target:
CMS Made Simple 2.2.8
No auth needed
Prerequisites:
Access to target IP · Gobuster for directory enumeration · Exploit script for CVE-2019-9053 · Wordlist for password cracking
nomisec
WORKING POC
by Perseus99999 · poc
https://github.com/Perseus99999/CVE-2019-9053-working-
This is a functional exploit for CVE-2019-9053, targeting a time-based SQL injection vulnerability in CMS Made Simple versions <= 2.2.9. The script extracts admin credentials (username, password, salt, and email) via blind SQLi and includes a password cracking feature using a provided wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation · Network connectivity to the target · Optional: Wordlist for password cracking
nomisec
WORKING POC
by CaelumIsMe · poc
https://github.com/CaelumIsMe/CVE-2019-9053-POC
This is a Python-based exploit for CVE-2019-9053, an unauthenticated time-based blind SQL injection vulnerability in CMS Made Simple versions < 2.2.10. It extracts admin credentials (salt, username, email, password hash) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple < 2.2.10
No auth needed
Prerequisites:
Python 3.x · requests library · termcolor library · target URL
nomisec
WORKING POC
by Slayerma · poc
https://github.com/Slayerma/-CVE-2019-9053
This is a functional exploit for CVE-2019-9053, targeting an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. It uses time-based blind SQLi to dump the admin username, email, password hash, and salt, with an optional password cracking feature.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation
nomisec
WORKING POC
by Boon-Rekcah · poc
https://github.com/Boon-Rekcah/CMS-Made-Simple-2.2.9-CVE-2019-9053
This is a Python-based exploit for CVE-2019-9053, an unauthenticated SQL injection vulnerability in CMS Made Simple. It extracts administrator credentials (username, email, hashed password, and salt) via time-based blind SQLi and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
by louisthedonothing · poc
https://github.com/louisthedonothing/CVE-2019-9053
This is a Python3 rewrite of an exploit for CVE-2019-9053, targeting an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. It uses time-based blind SQLi to extract sensitive data (e.g., admin credentials) and optionally cracks the password hash using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation · Network access to the target · Optional wordlist for password cracking
nomisec
WORKING POC
by Kalidas-7 · poc
https://github.com/Kalidas-7/CVE-2019-9053
This is a functional Python 3 exploit for CVE-2019-9053, performing unauthenticated time-based blind SQL injection against CMS Made Simple <= 2.2.9 to extract admin credentials and optionally crack the password hash.
Classification
Working Poc 100%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Python 3 · termcolor module · target URL · optional wordlist for password cracking
nomisec
WORKING POC
by Hackheart-tech · poc
https://github.com/Hackheart-tech/-exploit-lab
This is a Python 3 port of an exploit for CVE-2019-9053, an unauthenticated SQL injection vulnerability in CMS Made Simple. It extracts sensitive data (salt, username, email, password hash) via time-based blind SQLi and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
by kaizoku73 · poc
https://github.com/kaizoku73/CVE-2019-9053
This is a functional exploit for CVE-2019-9053, targeting an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. It uses time-based blind SQLi to dump admin credentials and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
by del0x3 · poc
https://github.com/del0x3/CVE-2019-9053-port-py3
This is a Python 3 port of the CVE-2019-9053 exploit targeting CMS Made Simple (CMSMS) versions before 2.2.10. It leverages a SQL injection vulnerability in the News module to extract sensitive information such as the CMS salt, admin username, email, and password hash, with an optional password cracking feature.
Classification
Working Poc 95%
Target:
CMS Made Simple (CMSMS) < 2.2.10
No auth needed
Prerequisites:
Target URL with vulnerable CMSMS installation · Network access to the target
nomisec
WORKING POC
by so1icitx · poc
https://github.com/so1icitx/CVE-2019-9053
This repository contains a functional exploit for CVE-2019-9053, an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. The exploit uses time-based SQLi to extract admin credentials and optionally cracks passwords using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target must have the News module enabled · Python 3.6+ with requests and termcolor libraries
nomisec
WORKING POC
by hf3cyber · poc
https://github.com/hf3cyber/CMS-Made-Simple-2.2.9-Unauthenticated-SQL-Injection-Exploit-CVE-2019-9053-
This is a functional exploit for CVE-2019-9053, targeting an unauthenticated time-based blind SQL injection in CMS Made Simple <= 2.2.9. It extracts user credentials (username, email, password hash, and salt) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
by Yzhacker · poc
https://github.com/Yzhacker/CVE-2019-9053-CMS46635-python3
This is a Python3 exploit for CVE-2019-9053, an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. It uses time-based blind SQL injection to dump admin credentials and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WRITEUP
by jtoalu · poc
https://github.com/jtoalu/CTF-CVE-2019-9053-GTFOBins
This repository documents a CTF challenge involving CVE-2019-9053, an SQL injection vulnerability in CMS Made Simple 2.2.8. It outlines steps for exploitation, privilege escalation via sudo misconfiguration, and leveraging GTFOBins for root access.
Classification
Writeup 90%
Target:
CMS Made Simple 2.2.8
No auth needed
Prerequisites:
Access to target web server · CMS Made Simple 2.2.8 installation · Sudo misconfiguration allowing vim execution
nomisec
WORKING POC
by 0xftorres · poc
https://github.com/0xftorres/CVE-2019-9053-Fixed
This repository provides bug fixes for the CVE-2019-9053 exploit, which targets CMS Made Simple versions prior to 2.2.10 via SQL Injection. It includes a patch to improve the original exploit's functionality.
Classification
Working Poc 90%
Target:
CMS Made Simple < 2.2.10
No auth needed
Prerequisites:
Access to the target CMS Made Simple instance · Python environment to run the exploit
nomisec
WORKING POC
by Jason-Siu · poc
https://github.com/Jason-Siu/CVE-2019-9053-Exploit-in-Python-3
This is a Python 3 exploit for CVE-2019-9053, an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. It uses time-based blind SQL injection to dump the admin username, email, password hash, and salt, with an optional password cracking feature.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
by BjarneVerschorre · poc
https://github.com/BjarneVerschorre/CVE-2019-9053
This is a Python-based exploit for CVE-2019-9053, targeting an unauthenticated blind time-based SQL injection vulnerability in 'Simple Made' CMS. It extracts sensitive data such as usernames, passwords, salts, and emails by leveraging time delays in SQL queries.
Classification
Working Poc 95%
Target:
Simple Made CMS
No auth needed
Prerequisites:
Target URL with vulnerable endpoint · Python 3.11 · httpx library
nomisec
WORKING POC
by davcwikla · poc
https://github.com/davcwikla/CVE-2019-9053-exploit
This repository contains a functional exploit for CVE-2019-9053, a time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. The exploit dumps admin credentials (username, email, salted password hash) and includes a password cracking utility.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Network access to vulnerable CMS Made Simple instance
nomisec
WORKING POC
by byrek · poc
https://github.com/byrek/CVE-2019-9053
This is a Python-based exploit for CVE-2019-9053, a time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. It extracts admin credentials (username, password hash, salt) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Network connectivity to the target · Optional wordlist for password cracking
nomisec
WORKING POC
by kahluri · poc
https://github.com/kahluri/CVE-2019-9053
This is a Python-based exploit for CVE-2019-9053, targeting a time-based SQL injection vulnerability in CMS Made Simple. It dumps sensitive information (salt, username, email, and password) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple (version not specified)
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation · Optional wordlist for password cracking
nomisec
WORKING POC
by im-suman-roy · poc
https://github.com/im-suman-roy/CVE-2019-9053
This exploit demonstrates an unauthenticated time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. It extracts admin credentials (username, email, password hash, and salt) via blind SQLi and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation · Network access to the target
nomisec
WORKING POC
by zmiddle · poc
https://github.com/zmiddle/Simple_CMS_SQLi
This repository contains a Python-based exploit for CVE-2019-9053, an unauthenticated SQL injection vulnerability in CMS Made Simple <= 2.2.9. The exploit uses time-based blind SQL injection to dump admin credentials (username, email, password hash, and salt) and optionally cracks the password using a wordlist.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL · Optional wordlist for password cracking
nomisec
WORKING POC
by maraspiras · poc
https://github.com/maraspiras/46635.py
This is a functional exploit for CVE-2019-9053, leveraging a time-based SQL injection vulnerability in CMS Made Simple <= 2.2.9. It extracts sensitive information such as admin credentials, salt, email, and password hashes, with an optional brute-force cracking feature.
Classification
Working Poc 95%
Target:
CMS Made Simple <= 2.2.9
No auth needed
Prerequisites:
Target URL with vulnerable CMS Made Simple installation · Optional wordlist for password cracking