vendor:
WebLeague 2.2.0
by:
ka0x
7,5
CVSS
HIGH
Remote Admin Bypass
89
CWE
Product Name: WebLeague 2.2.0
Affected Version From: 2.2.0
Affected Version To: 2.2.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2009
WebLeague 2.2.0 Remote Admin Bypass p0c
This exploit is based on the vulnerability in WebLeague 2.2.0, which allows an attacker to bypass the authentication process and gain access to the admin panel. The vulnerability is due to the fact that the application does not properly sanitize the user input, allowing an attacker to inject malicious code into the username and password fields. The exploit code uses a POST request to send malicious code to the application, which is then executed by the application.
Mitigation:
The application should properly sanitize user input to prevent malicious code injection.