Inlislite 3.2 Insecure Settings

Inlislite version 3.2 appears to leave a default administrative account in place post installation.


SHA-256 | a7c1030e6a641d59e605acb4f1cb5681d3819527d4b0587352dcaa865ba09e7d

====================================================================================================================================
| # Title : Inlislite V3.2 Backdoor Account Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 103.0(64-bit) |
| # Vendor : https://inlislite.perpusnas.go.id/?read=installerphp |
| # Dork : Inlislite V3.2 © 2017 - 2018 |
====================================================================================================================================

poc :
[+] The vulnerability is about leaving the default settings
During the installation of the script and using the default username and password

[+] Dorking İn Google Or Other Search Enggine.

[+] Use Payload : user=inlislite & pass=inlislite= or user=superadmin & pass=superadmin

[+] https://inlislite.127.0.0.1/backend/

Greetings to :=========================================================================================================================
|
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* moncet |
|
=======================================================================================================================================

Related Posts