Python3-converted exploit and research notes for CMS Made Simple (CVE-2019-9053) — Unauthenticated SQL Injection vulnerability. Includes original PoC, improved Python3 version, usage instructions, and lab testing reference.# CMS Made Simple – Exploitation Toolkit
A collection of scripts, notes, and Python3–ready exploits for **CMS Made Simple (CMSMS)**, including the famous **Unauthenticated Time-Based SQL Injection – CVE-2019-9053**.
This repository is created and maintained by **Encrypticle (Jagdeep Singh)** as part of my cybersecurity research, ethical hacking practice, and 100-Day Cybersecurity Challenge series.
---
## 🚀 About This Repo
This repository contains:
- ✔️ The original Python2 exploit converted to Python3 for **CVE-2019-9053**
- ✔️ A fully ported **Python3 version** of the exploit
- ✔️ Walkthrough notes for attacking CMS Made Simple in labs
- ✔️ Usage examples for Python3
- ✔️ Fixes for common errors (print syntax, dependencies, termcolor issues, Python2 missing, etc.)
- ✔️ Wordlist cracking support (MD5 + salt)
---
## 🕳️ Vulnerability: CVE-2019-9053
CMS Made Simple versions **≤ 2.2.9** suffer from an **unauthenticated blind SQL injection** vulnerability.
Successful exploitation allows an attacker to leak:
- Salt
- Username
- Email
- Admin password hash
- And optionally crack the password using a wordlist
The original exploit uses time-based SQL injection via the `moduleinterface.php?mact=` parameter.
---
## 📂 Usage Example
sudo python3 exploit_python3.py -u http://TARGET/cms --crack -w /usr/share/wordlists/rockyou.txt
⚠️ Legal Disclaimer
This project is for educational and authorized penetration testing purposes only.
Do NOT use these scripts on systems you do not own or do not have written permission to test.
Unauthorized testing is illegal.
📧 Contact
Maintained by Encrypticle (Jagdeep Singh)
YouTube: https://youtube.com/@Encrypticle
LinkedIn: https://www.linkedin.com/company/Encrypticle
⭐ Support & Contribution
If this repository helped you —
Star ⭐ the repo, fork it, or contribute improvements to the Python3 exploit.
[4.0K] /data/pocs/718fe0e34c1b19141da7beddbd28e2dd2e685ac7
├── [6.9K] exploit_python3.py
└── [1.9K] README.md
1 directory, 2 files