GnB CMS Admin Login Bypass

2018.03.23
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit title: Admin Login Bypass ( GnB CMS ) # # Dork: - # # Date: 3-23-2018 # # Exploit Author: Mehdi Razmjoo ( razmjumehdi@gmail.com ) # # Vendor Homepage: http://www.9824000430.com # # Category: Web Application # # Tested On: Safari - Firefox # # ============================= # # Description: # # First of all attacker find admin login page like: # # " http://Server/Admin.aspx " # # after that bypass admin Username & Password through this command: # # User ID: ' or ''=' # Password: ' or ''=' # # Then attacker " Login " in this page. #

References:

http://www.littleberg.in


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top