The exploit demonstrates an insecure cookie handling vulnerability in Maian Gallery v2.0, where the admin authentication can be bypassed by setting a cookie with the MD5 hash of the admin username. This allows unauthorized access to the admin panel.
Classification
Working Poc 90%
Attack Type
Auth Bypass
Complexity
Trivial
Reliability
Reliable
Target:Maian Gallery v2.0
No auth needed
Prerequisites:Knowledge of the admin username (default is 'admin')