Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
"Aakash Madaan"
Platform
multiple
Release date
2020-12-02
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 | # Exploit Title: WebDamn User Registration & Login System with User Panel - SQLi Auth Bypass # Date: 18-11-2020 # Exploit Author: Aakash Madaan # Vendor Homepage: https://webdamn.com/ # Software Link : https://webdamn.com/user-management-system-with-php-mysql/ # Version: N/A (Default) # Tested on: Windows 10 professional Steps to reproduce: 1. Open user login page using following URl: -> http://localhost/login.php <http://localhost/login.html> 2. If attacker get access to valid email address ( leaked data or by any other means) then he/she can use the email address as follows: Payload: <email>' OR '1'='1 NOTE: Use the above payload in both username and password fields 3. Server accepts the payload and the attacker is able to bypass the user login panel with only email address. |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-12-02 | "WebDamn User Registration & Login System with User Panel - SQLi Auth Bypass" | webapps | multiple | "Aakash Madaan" |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/49170/?format=json')
For full documentation follow the link above