This exploit demonstrates an insecure cookie handling vulnerability in Maian Events v2.0, where the admin authentication can be bypassed by setting a cookie with the MD5 hash of the admin username. The exploit provides a JavaScript snippet to set the cookie value to the MD5 hash of 'admin'.
Classification
Working Poc 90%
Attack Type
Auth Bypass
Complexity
Trivial
Reliability
Reliable
Target:Maian Events v2.0
No auth needed
Prerequisites:Access to the target application's domain to set cookies