lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070209232558.23697.qmail@securityfocus.com> Date: 9 Feb 2007 23:25:58 -0000 From: sn0oPy.team@...il.com To: bugtraq@...urityfocus.com Subject: Allons_voter Version 1.0 xss and admin votes * Allons_voter Version 1.0 xss and admin votes wihtout password * By : sn0oPy * Risk : medium * Dork : inurl:"Allons_voter" * exploit : Be admin : http://www.target.com/Allons_voter/menu.html replace it by http://www.target.com/Allons_voter/admin_ajouter.php or http://www.target.com/Allons_voter/admin_supprimer.php + inject any script on the admin add menu. * contact : sn0oPy@...nir-geopolitique.net * greetz : [subzero], Avg Team(forums.avenir-geopolitique.net). Réference : http://forums.avenir-geopolitique.net/viewtopic.php?t=2641