Stock Manager Advance with Point of Sale Module v3.4.11 - nulled Backdoor Account Vulnerability - CXSecurity.com

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1475245 漏洞类型
发布时间 2019-02-08 更新时间 2019-02-08
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2019020074
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
====================================================================================================================================
| # Title     : Stock Manager Advance with Point of Sale Module v3.4.11 - nulled Backdoor Account Vulnerability                    |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit)                                            | 
| # Vendor    : https://codecanyon.net/item/stock-manager-advance-with-point-of-sale-module/5403161                                |  
| # Dork      : "©  SMA Shop. All rights reserved." or " product/minion-crazy "                                                    |
====================================================================================================================================


poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] Role : username / password
    Owner: owner@tecdiary.com / 12345678
    Admin: admin@tecdiary.com / 12345678

[+] http://fajeralenarah.com/admin/

Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================