Home / exploits Tuninfoforyou - Weak Password Vulnerability
Posted on 30 November -0001
<HTML><HEAD><TITLE>Tuninfoforyou - Weak Password Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>###################### # Exploit Title : Tuninfoforyou - Weak Password Vulnerability # Exploit Author : Persian Hack Team # Vendor Homepage : http://www.tuninfoforyou.com/ # Category: [ Webapps ] # Tested on: [ Win ] # Version: 2 And 2.5 # Date: 2016/05/20 ###################### # # PoC: # Login Page : /reservation/admin/ And /b2b/admin/ # User and Password = admin # # Demo : # http://www.etsw-ltd.com/b2b/admin/login.php # http://www.voyageair.net/b2b/admin/login.php # http://www.mehditours.com/b2b/admin/login.php # http://www.b-ltravel.com/reservation/admin/admMenu.php # http://www.gourayatours.com//reservation/admin/login.php # ###################### # Discovered by : Mojtaba MobhaM (<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="563d372c333b3f3b393c22373437163a3f20337835393b">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>) # Greetz : T3NZOG4N , FireKernel, Milad Hacking & And All Persian Hack Team Members # Homepage : persian-team.ir ###################### </BODY></HTML>