Foodiee - Online Food Ordering Web Application V1.0.0 Backdoor Account Vulnerability - CXSecurity.com

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1612320 漏洞类型
发布时间 2019-05-17 更新时间 2019-05-17
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2019050176
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
====================================================================================================================================
| # Title     : Foodiee - Online Food Ordering Web Application V1.0.0 Backdoor Account Vulnerability                               |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0(64-bit)                                               | 
| # Vendor    : https://codecanyon.net/item/foodiee-restaurant-web-application/23335754?s_rank=57                                  |  
| # Dork      :                                                                                                                    |
====================================================================================================================================

poc :


[+] Dorking İn Google Or Other Search Enggine.

[+] Use Backdoor Account : Username – admin@foodiee.com

                           Password – 123456 
                  
[+] Panel       : http://themeforest.kamleshyadav.net/script/foodiee/admin/



Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================