==================================================================================================================================== | # Title : Active Matrimonial CMS v3.5 Insecure Settings Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 108.0(64-bit) | | # Vendor : https://codecanyon.net/item/active-matrimonial-cms/21627663?s_rank=25 | | # Dork : "Every user registered on Active Matrimonial is verified via photo and mobile phone " | ==================================================================================================================================== poc : [+] The vulnerability is about leaving the default settings During the installation of the script and using the default username and password [+] Dorking İn Google Or Other Search Enggine. [+] Use Payload : user=admin@example.com & pass=123456 [+] https://127.0.0.1/matrimonial.instaaworkcom/admin/ Greetings to :========================================================================================================================= | jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* moncet | | =======================================================================================================================================