## https://sploitus.com/exploit?id=PACKETSTORM:173074
====================================================================================================================================
| # Title : Acon - Architecture and Construction Website CMS v1.2 Insecure Settings Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) |
| # Vendor : https://www.mother-of-mangrove.com/xicia/cc/acon/ |
| # Dork : Acon - Building and Architecture Website CMS |
====================================================================================================================================
poc :
[+] The vulnerability is about leaving the default settings
During the installation of the script and using the default username and password
[+] Dorking In Google Or Other Search Enggine .
[+] use login : Username: admin@gmail.com & Password: 1234
[+] http://127.0.0.1/www/demoslycom/xicia/cc/acon/admin/
====Greetings to :===================================================================================================================
| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |
=====================================================================================================================================