Security
Headlines
HeadlinesLatestCVEs

Headline

DoorGets CMS 7.0 Information Disclosure

DoorGets CMS version 7.0 suffers from an information leakage vulnerability.

Packet Storm
#vulnerability#windows#google#php#auth#firefox

====================================================================================================================================
| # Title : DoorGets CMS v7.0 Sensitive information disclosure Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 65.0(32-bit) |
| # Vendor : https://sourceforge.net/projects/doorgets-cms/files/latest/download?source=directory |
| # Dork : “Powered with doorGets ™” |
====================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] Payload gives you the username and password for the site script manager.

[+] The problem is caused when the installation folder is not deleted by the user .

[+] In this case the developer made a mistake .

So that after installation, the script does not delete the installation file or notify the user of changing the folder path or deleting it. 

It also stores the manager's information in temporary files that any visitor can scan and can use this information to the script control panel.

[+] Use Payload : setup/temp/admin.php

[+] it show you login information for admin access .

[+] http://127.0.0.1/watsingschoolacth/v12/setup/temp/admin.php

Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 9aylasdjroot.dzLiquidWormHussin-X*D4NB4R *ViRuS_Ra3cH yasMouh CraCkEr |
=======================================================================================================================================

Packet Storm: Latest News

ABB Cylon Aspect 3.08.01 vstatConfigurationDownload.php Configuration Download