Title | Needyamin Library-Card-System 1.0 Broken Access Control |
---|
Description | Title of the Vulnerability: Library-Card-System | Broken Access Control In admindashboard.php
Finder & Exploit Owner: Maloy Roy Orko
Vulnerability Class: Broken Access Control
Product Name: Library-Card-System
Vendor: Needyamin
Type: Library-Card-System
Vulnerable Product Link: https://github.com/needyamin/Library-Card-System/
Vendor Link:
https://github.com/needyamin/
Affected Components: /admindashboard.php
In Short:
Broken Access Control Vulnerability Found By Maloy Roy Orko to In The Admin Panel Of Library-Card-System 1.0(Vendor: Needyamin).The Admin Panel (admindashboard.php) Can Be Login By Anyone Without Entering Any Credentials As It Has No Proper Access Management & It Let Us Login Without Correct Credentials.
Suggested Description:
Broken Access Control in "/admindashboard.php" in "Library-Card-System application By needyamin v 1.0" Found By "Maloy Roy Orko" allows "remote" attacker "to login into admin panel without entering credentials in admin.php as no validations are provided" via "admin/gallery.php".
Attack Vectors:
To exploit vulnerability,he has to go to /admindashboard.php.Thus, Attacker can gain access to Admin Panel without even login!
Detailed Blog:
https://www.websecurityinsights.my.id/2025/01/library-card-system-admin-login-bypass.html?m=1
|
---|
Source | ⚠️ https://www.websecurityinsights.my.id/2025/01/library-card-system-admin-login-bypass.html?m=1 |
---|
User | MaloyRoyOrko (UID 79572) |
---|
Submission | 01/20/2025 02:10 AM (4 months ago) |
---|
Moderation | 01/29/2025 04:38 PM (10 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 294000 [needyamin Library Card System 1.0 Admin Panel admindashboard.php email/password sql injection] |
---|
Points | 20 |
---|