PT.AlvaroPrima Password admin And Username Admin
by ZxD - 14-07-25, 04:01 PM
#11
Thanks for share
Ban reason: Leeching (Permanent)
Reply
#12
(14-07-25, 04:01 PM)ZxD Wrote:
🚨 发现严重漏洞 — PT. Alvaroprima 在印度尼西亚公司 PT. Alvaroprima
运营的官方 Web 系统上发现了一个重大的 SQL 注入漏洞。
此缺陷允许未经授权的行为者直接干扰应用程序的数据库查询,这可能会导致完整的数据泄露。


🧠 --- 发现者: ZxD — 网络安全研究人员
📆 发现日期: 2025 年 7
🌐 月 目标域: 为安全
🛡️起见已编辑 攻击媒介: 通过 URL 参数注入 SQL (GET 方法)
---
### ⚠️ 技术摘要:
此漏洞是由于缺乏适当的输入清理和直接查询执行而发生的。攻击者可以制作恶意输入来纵后端的 SQL 语句。
这种类型的漏洞可用于:
- 🎯 绕过登录身份验证
- 📥 转储数据库内容(用户名、密码、电子邮件等)
- 🔎 列举表格和列
- 🗑️ 删除或更改存储的记录(在高级情况下)
- 🚪 未经授权访问管理面板或内部系统
---
### 🔐 道德说明:
此漏洞仅出于道德和研究目的而被记录在案。
未对系统进行任何伤害、污损或破坏性测试。
强烈建议PT. Alvaroprima立即通过实施来解决这个问题:
- 参数化查询
- WAF过滤器
- 输入验证
- 日志记录和入侵检测
---

💬 对技术证明的访问是隐藏的,并为受信任的成员或安全人员保留。
---
— 由 ZxD 报告和保护 (2025) 
Reply
#13
Thanks bro, lets see if ots valuable CringeHarold
Reply
#14
Great job!!! Let's check it out!
Reply
#15
nice leak
Reply
#16
thanks
Reply
#17
(14-07-25, 04:01 PM)ZxD Wrote:
🚨 Critical Vulnerability Discovered — PT. Alvaroprima
A major SQL Injection vulnerability has been discovered on the official web system operated by PT. Alvaroprima, an Indonesian-based company. 
This flaw allows unauthorized actors to directly interfere with the application's database queries, which could potentially result in full data exposure.

---
🧠 Discovered by: ZxD — Cyber Security Researcher
📆 Discovery Date: July 2025 
🌐 Target Domain: Redacted for safety 
🛡️ Attack Vector: SQL Injection via URL parameter (GET Method)
---
### ⚠️ Technical Summary:
The vulnerability occurs due to a lack of proper input sanitization and direct query execution. Attackers can craft malicious inputs to manipulate SQL statements on the backend.
This type of vulnerability can be used to:
- 🎯 Bypass login authentication 
- 📥 Dump database content (usernames, passwords, emails, etc.) 
- 🔎 Enumerate tables and columns 
- 🗑️ Delete or alter stored records (in advanced cases) 
- 🚪 Gain unauthorized access to admin panels or internal systems
---
### 🔐 Ethical Note:
This vulnerability has been documented for ethical and research purposes only. 
No harm, defacement, or destructive testing has been performed on the system.
It is highly recommended that PT. Alvaroprima immediately patch this issue by implementing:
- Parameterized queries
- WAF filters
- Input validation
- Logging & intrusion detection
---

💬 Access to the technical proof is hidden and reserved for trusted members or security staff.
---
— Reported & Secured by ZxD (2025) 

sounds good sir tq
Reply
#18
(14-07-25, 04:01 PM)ZxD Wrote:
🚨 Critical Vulnerability Discovered — PT. Alvaroprima
A major SQL Injection vulnerability has been discovered on the official web system operated by PT. Alvaroprima, an Indonesian-based company. 
This flaw allows unauthorized actors to directly interfere with the application's database queries, which could potentially result in full data exposure.

---
🧠 Discovered by: ZxD — Cyber Security Researcher
📆 Discovery Date: July 2025 
🌐 Target Domain: Redacted for safety 
🛡️ Attack Vector: SQL Injection via URL parameter (GET Method)
---
### ⚠️ Technical Summary:
The vulnerability occurs due to a lack of proper input sanitization and direct query execution. Attackers can craft malicious inputs to manipulate SQL statements on the backend.
This type of vulnerability can be used to:
- 🎯 Bypass login authentication 
- 📥 Dump database content (usernames, passwords, emails, etc.) 
- 🔎 Enumerate tables and columns 
- 🗑️ Delete or alter stored records (in advanced cases) 
- 🚪 Gain unauthorized access to admin panels or internal systems
---
### 🔐 Ethical Note:
This vulnerability has been documented for ethical and research purposes only. 
No harm, defacement, or destructive testing has been performed on the system.
It is highly recommended that PT. Alvaroprima immediately patch this issue by implementing:
- Parameterized queries
- WAF filters
- Input validation
- Logging & intrusion detection
---

💬 Access to the technical proof is hidden and reserved for trusted members or security staff.
---
— Reported & Secured by ZxD (2025) 
Reply
#19
nice for sharing
Reply
#20
intresting
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)