Babaji E-Commerce version 1.0 suffers from an ignored default credential vulnerability.
4d3b970b186a001d12a015789a514704d54bdf1bf48563c6aabfcf1cfd811928
=============================================================================================================================================
| # Title : Babaji E-Commerce v1.0 Insecure Settings Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |
| # Vendor : https://wellprogram.blogspot.com/2019/01/e-commerce-site-in-php-with-source-code.html |
=============================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] Insecure Settings : appears to leave a default administrative account in place post installation.
[+] use payload : user = admin@admin.com & pass = password
[+] https://www/127.0.0.1/demo/khmerlotcom/login
Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================