DoorGets CMS version 7.0 suffers from an information leakage vulnerability.
e4dd4e13f6683cf82c0e69a415af646d4525941805e5d02a2a2a1438821ec8e2
====================================================================================================================================
| # Title : DoorGets CMS v7.0 Sensitive information disclosure Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 65.0(32-bit) |
| # Vendor : https://sourceforge.net/projects/doorgets-cms/files/latest/download?source=directory |
| # Dork : "Powered with doorGets ™" |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] Payload gives you the username and password for the site script manager.
[+] The problem is caused when the installation folder is not deleted by the user .
[+] In this case the developer made a mistake .
So that after installation, the script does not delete the installation file or notify the user of changing the folder path or deleting it.
It also stores the manager's information in temporary files that any visitor can scan and can use this information to the script control panel.
[+] Use Payload : setup/temp/admin.php
[+] it show you login information for admin access .
[+] http://127.0.0.1/watsingschoolacth/v12/setup/temp/admin.php
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================