Pop Under Ads Network 1.0 MySQL Credential Disclosure

2016.09.27
Credit: indoushka
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

| # Title : pop under ads network v1.0 MySQL connection credentials Vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 8.1 FranASSais V.(Pro) | # Version : 1.0 | # Vendor : http://dl.20script.ir/script/ads/20S-pop-under-ads-network-v1.0[www.20script.ir].zip ======================================================================== Vulnerability description : For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name of the host where the server is running and the user name and password of your MySQL account. This file contains full/partial source code that contains a mysql_connect/mysql_pconnect function call that includes the MySQL connection credentials. This information is highly sensitive and should not be found on a production system. poc : 1 - right click and open the page source . 2 - http://b.top4top.net/p_201kowq1.jpg Greetz :---------------------------------------------------------------- | jericho * Larry W. Cashdollar * moncet-1 * achraf.tn | | ========================================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top