--==+================================================================================+==-- --==+ PhShoutBox <= 1.5 (final) Insecure Cookie Handling (Arbitrary Authentication) +==-- --==+================================================================================+==-- Discovered By: t0pP8uZz Discovered On: 18 April 2008 Script Download: http://phphq.net/scripts.php?p=free-scripts&id=2 DORK: inurl:"phshoutbox.php" Vendor Has Not Been Notified! DESCRIPTION: PhShoutBox suffers from insecure cookie handling, allowing the remote attacker to craft a cookie that makes the attacker look like a admin, this works because the admin panel only checks the password if a password has been posted using the php vars "$_POST" if POST isnt set, then the cookies will be checked for existance if they exist then it will grant admin. the javascript code below is the easyiesy way to do this, just paste it in your browser whilst at the vulnerable site, then visit "admin.php" Vulnerability: version 1.5: javascript:document.cookie = "phadmin=True; path=/;"; version < 1.4: javascript:document.cookie = "ssbadmin=True; path=/;"; NOTE/TIP: admin login is at "/admin.php" on 1.5 final and at "/shoutadmin.php" on 1.4 & below GREETZ: milw0rm.com, h4ck-y0u.org, CipherCrew ! --==+================================================================================+==-- --==+ PhShoutBox <= 1.5 (final) Insecure Cookie Handling (Arbitrary Authentication) +==-- --==+================================================================================+==--
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论