This exploit demonstrates an authentication bypass and SQL injection vulnerability in Majoda CMS. It provides credentials to bypass the login mechanism by injecting SQL tautologies into the username and password fields.
Classification
Working Poc 90%
Attack Type
Sqli | Auth Bypass
Complexity
Trivial
Reliability
Reliable
Target:Majoda CMS (version unspecified)
No auth needed
Prerequisites:Access to the admin login page at /admin/index.asp