vendor:
RogioBiz PHP File Manager
by:
ItSecTeam
8,8
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: RogioBiz PHP File Manager
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: NO
Related CWE: N/A
CPE: a:rogiobiz:rogiobiz_php_file_manager:1.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
Bypass Admin Exploit
This exploit allows an attacker to bypass authentication by entering a single quote (') as the username and password. This is due to the lack of input validation in the login form of the RogioBiz_PHP_file_manager_V1.2 script. The script can be downloaded from http://www.scriptingblog.com/download/RogioBiz_PHP_file_manager_V1.2.zip and can be found using the dork inurl:/rbfminc/.
Mitigation:
Input validation should be implemented to ensure that only valid usernames and passwords are accepted.