header-logo
Suggest Exploit
vendor:
epay
by:
indoushka
8.8
CVSS
HIGH
Backup
N/A
CWE
Product Name: epay
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)
Unknown

epay Backup Vulnerability

An attacker can access the backup.gz file from the server by accessing the URL http://server/epay/backup/backup.gz

Mitigation:

Restrict access to the backup.gz file by implementing proper authentication and authorization mechanisms.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : epay  Backup Vulnerability                                              |
| # Author   : indoushka                                                               |
| # email    : indoushka@hotmail.com                                                   |
| # Home     : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)       |
| # Web Site : www.iq-ty.com                                                           |
| # Script   : Powered by : epay                                                       |
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       |
| # Bug      : Backup                                                                  | 
======================      Exploit By indoushka       =================================
| # Exploit  : 
| 
| 1- http://server/epay/backup/backup.gz
|
================================   Dz-Ghost Team   ========================================
Greetz : all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 |
-------------------------------------------------------------------------------------------