# Exploit Title: Akiva Webboard 8.x SQL Injection + Plaintext Passwords in Profiles. # Google Dork: " /Powered by WebBoard 8"/ # Date: 30.12.2011 # Author: Alexander Fuchs # Software Link: http://www.akiva.com/default.asp?l=1&id=8 # Version: 8.x # Tested on: Windows, Linux. # CVE : Nope. It is possible to login as administrator with admin'-- as username and password. You can now go in the admin profil to look at the password which is in plaintext in html.
Related ExploitsTrying to match CVEs (2): CVE-2011-5203, CVE-2011-5204
Trying to match OSVDBs (2): 78069, 86023
Other Possible E-DB Search Terms: Akiva WebBoard 8.x, Akiva WebBoard