exploit-db-mirror/exploits/php/webapps/18293.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

14 lines
No EOL
462 B
Text

# Exploit Title: Akiva Webboard 8.x SQL Injection + Plaintext Passwords
in Profiles.
# Google Dork: " /Powered by WebBoard 8"/
# Date: 30.12.2011
# Author: Alexander Fuchs
# Software Link: http://www.akiva.com/default.asp?l=1&id=8
# Version: 8.x
# Tested on: Windows, Linux.
# CVE : Nope.
It is possible to login as administrator with admin'-- as username and
password.
You can now go in the admin profil to look at the password which is in
plaintext in html.