Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Purle Devloper Panel 1.0 Insecure Direct Object Reference[6]
- Authored by indoushka[7]
-
Purle Devloper Panel version 1.0 suffers from an insecure direct object reference vulnerability that allows an unauthenticated user to update passwords.
- SHA-256 |
09602b15944fd8f6ca6576813cf5614b52f48c4af7af9eddcbe67850c33c8a7b
- Download[8] | Favorite[9] | View[10]
Change Mirror[11] Download[12]
====================================================================================================================================
| # Title : Purle Devloper Panel ver 1.0 Unauthorized administrative access Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 102.0.1(64-bit) |
| # Vendor : http://www.njmweb.we.bs/Purple10/PURPLEV10.zip |
| # Dork : "Purle Devloper Panel" |
====================================================================================================================================
poc :
[+] an unauthenticated access allow you to update password.
[+] Dorking İn Google Or Other Search Enggine.
[+] Use payload : /user_update.php
[+] https://127.0.0.1/purple.iprebrandsapp/user_update.php
Greetings to :=========================================================================================================================
|
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* moncet |
|
=======================================================================================================================================
File Tags
- ActiveX[18] (932)
- Advisory[19] (81,379)
- Arbitrary[20] (16,086)
- BBS[21] (2,859)
- Bypass[22] (1,697)
- CGI[23] (1,024)
- Code Execution[24] (7,179)
- Conference[25] (678)
- Cracker[26] (841)
- CSRF[27] (3,321)
- DoS[28] (23,204)
- Encryption[29] (2,363)
- Exploit[30] (51,247)
- File Inclusion[31] (4,196)
- File Upload[32] (956)
- Firewall[33] (821)
- Info Disclosure[34] (2,722)
- Intrusion Detection[35] (885)
- Java[36] (3,003)
- JavaScript[37] (842)
- Kernel[38] (6,586)
- Local[39] (14,394)
- Magazine[40] (586)
- Overflow[41] (12,621)
- Perl[42] (1,423)
- PHP[43] (5,129)
- Proof of Concept[44] (2,335)
- Protocol[45] (3,567)
- Python[46] (1,510)
- Remote[47] (30,539)
- Root[48] (3,567)
- Rootkit[49] (506)
- Ruby[50] (609)
- Scanner[51] (1,633)
- Security Tool[52] (7,856)
- Shell[53] (3,165)
- Shellcode[54] (1,211)
- Sniffer[55] (893)
- Spoof[56] (2,189)
- SQL Injection[57] (16,237)
- TCP[58] (2,395)
- Trojan[59] (687)
- UDP[60] (884)
- Virus[61] (664)
- Vulnerability[62] (31,601)
- Web[63] (9,579)
- Whitepaper[64] (3,745)
- x86[65] (961)
- XSS[66] (17,701)
- Other[67]
File Archives
- June 2023[68]
- May 2023[69]
- April 2023[70]
- March 2023[71]
- February 2023[72]
- January 2023[73]
- December 2022[74]
- November 2022[75]
- October 2022[76]
- September 2022[77]
- August 2022[78]
- July 2022[79]
- Older[80]
Systems
- AIX[81] (428)
- Apple[82] (1,980)
- BSD[83] (373)
- CentOS[84] (57)
- Cisco[85] (1,921)
- Debian[86] (6,762)
- Fedora[87] (1,691)
- FreeBSD[88] (1,244)
- Gentoo[89] (4,321)
- HPUX[90] (879)
- iOS[91] (345)
- iPhone[92] (108)
- IRIX[93] (220)
- Juniper[94] (67)
- Linux[95] (45,894)
- Mac OS X[96] (685)
- Mandriva[97] (3,105)
- NetBSD[98] (256)
- OpenBSD[99] (482)
- RedHat[100] (13,380)
- Slackware[101] (941)
- Solaris[102] (1,610)
- SUSE[103] (1,444)
- Ubuntu[104] (8,666)
- UNIX[105] (9,249)
- UnixWare[106] (186)
- Windows[107] (6,558)
- Other[108]
- Services
- Security Services[119]
- Hosting By
- Rokasec[120]