Active Matrimonial CMS 3.5 Insecure Settings

Active Matrimonial CMS version 3.5 appears to leave a default administrative account in place post installation.


SHA-256 | 3ce619bd9bb6a7ff99353bad5b0740472aa5ff864502c884fe32b5f01e17ba9b

====================================================================================================================================
| # Title : Active Matrimonial CMS v3.5 Insecure Settings Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 108.0(64-bit) |
| # Vendor : https://codecanyon.net/item/active-matrimonial-cms/21627663?s_rank=25 |
| # Dork : "Every user registered on Active Matrimonial is verified via photo and mobile phone " |
====================================================================================================================================

poc :

[+] The vulnerability is about leaving the default settings
During the installation of the script and using the default username and password

[+] Dorking İn Google Or Other Search Enggine.

[+] Use Payload : [email protected] & pass=123456

[+] https://127.0.0.1/matrimonial.instaaworkcom/admin/

Greetings to :=========================================================================================================================
|
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* moncet |
|
=======================================================================================================================================

Related Posts