COVID19 Testing Management System 1.0 Insecure Settings

COVID19 Testing Management System 1.0 Insecure Settings
Posted Sep 16, 2024
Authored by indoushka

COVID19 Testing Management System version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | dfa6d3c1b41f7c8e3917b8e4d5def4360450f04e1bb6399bc37f9bced0bec05a
====================================================================================================================================
| # Title : COVID19 - Testing Management System 1.0 Insecure Settings Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.0 (64 bits) |
| # Vendor : https://phpgurukul.com/covid19-testing-management-system-using-php-and-mysql/ |
====================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] Insecure Settings : appears to leave a default administrative account in place post installation.

[+] use payload :

Username: admin

Password: Test@123

[+] http://127.0.0.1/covid-tms/admin/dashboard.php

Greetings to :==================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |
================================================================

نوشته های مشابه