source: https://www.securityfocus.com/bid/12304/info
Siteman is reported prone to a vulnerability that may allow users to gain elevated privileges. This issue results from insufficient sanitization of user-supplied data.
Apparently, an attacker can supply additional lines to the stream used to write to the user database file through a URI parameter. This can allow the attacker to corrupt the user database file and potentially gain administrative privileges to the Siteman application.
Siteman 1.1.10 and prior versions are affected by this vulnerability.
These data were recorded.
Username(Use this, and not your display name, when logging in) | amir452 |
Password | |
Secret Question (Asked when you forget your password) | amir452 |
Answer to secret question | |
Display name | amir452 |
Member Level | 5 (Admin) |
amir452@amir452.com | |
Hide my email adress | no |
Forum Signature | hackers |