BloodBank version 1.1 suffers from an ignored default credential vulnerability.
e7484cc3dee661f45c55f97b4e23233108b80b1c4fe04adf3e05b62052052b97
====================================================================================================================================
| # Title : BloodBank 1.1 Insecure Settings Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://demo.phpscriptpoint.com/bloodbank/ |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] Insecure Settings : appears to leave a default administrative account in place post installation.
[+] use payload : user = admin@gmail.com & pass = 1234
[+] https://www/127.0.0.1/demo/phpscriptpointcom/bloodbank/admin
Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================