- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 5780
- Проверка EDB
-
- Пройдено
- Автор
- ZIGMA
- Тип уязвимости
- WEBAPPS
- Платформа
- ASP
- CVE
- cve-2008-6739
- Дата публикации
- 2008-06-10
Код:
\ ASPDownload v 1.03 Remote Admin Bypass Exploit /
\ /
\_______________________________________________/
[+] Author : Underz0ne Crew
[+] Script : ASPDownload v 1.03
[+] Risk : High
[+] Script URL : http://www.toddwoolums.com/aspdownload.asp
[+] Dork : Powered by AspDownload
--//--> Exploit Area :
[+] Description : The problem is that the script's owner doesnt request a Login page for the DANGEROUS file setupdownload.asp where we can RESET the admin's
access and change the admin's informations for whatever we want !
[+] How to Exploit :
1) Go to : http://dork.cc/PathToScript/setupdownload.asp
2) Change the Info's
3) Login with the new informations in default.asp page
4) Upload an ASP shell from the upload.asp page
So simple!
[+] Greetz : stack , Bl@ckbe@rD , Djekmani , HouSSamiX
# milw0rm.com [2008-06-10]
- Источник
- www.exploit-db.com