Share
## https://sploitus.com/exploit?id=PACKETSTORM:173074
====================================================================================================================================  
| # Title : Acon - Architecture and Construction Website CMS v1.2 Insecure Settings Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) |  
| # Vendor : https://www.mother-of-mangrove.com/xicia/cc/acon/ |   
| # Dork : Acon - Building and Architecture Website CMS |  
====================================================================================================================================  
  
poc :  
  
[+] The vulnerability is about leaving the default settings  
During the installation of the script and using the default username and password  
  
[+] Dorking In Google Or Other Search Enggine .  
  
[+] use login : Username: admin@gmail.com & Password: 1234   
  
[+] http://127.0.0.1/www/demoslycom/xicia/cc/acon/admin/  
  
  
====Greetings to :===================================================================================================================  
| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |  
=====================================================================================================================================