lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070728110324.12853.qmail@securityfocus.com> Date: 28 Jul 2007 11:03:24 -0000 From: darthballsbr@...mail.com To: bugtraq@...urityfocus.com Subject: PHPBlogger cookie privilege escalation PHPBlogger is a simple tool to help the creation of web blogs... Encrypted admin password and other preferences are stored on /data/pref.db You can find lots of them exposed with google search: pref password= filetype:db =] -------------------------------------------- The admin panel is acessible once you have a cookie named "key" with the encrypted password So, its possible to administrate remote blogs just by searching for a exposed pref.db and creating a cookie for the page with the encrypted password for more detailes (pt-BR) http://forcehacker.com/forum/viewtopic.php?t=2352 by darthballs