lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080622115458.20678.qmail@securityfocus.com>
Date: 22 Jun 2008 11:54:58 -0000
From: tan_prathan@...mail.com
To: bugtraq@...urityfocus.com
Subject: Benja CMS 0.1 (Upload/XSS) Multiple Remote Vulnerabilities

==============================================================
  Benja CMS 0.1 (Upload/XSS) Multiple Remote Vulnerabilities
==============================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'


AUTHOR : CWH Underground
DATE   : 22 June 2008
SITE   : www.citec.us


#####################################################
 APPLICATION : Benja CMS
 VERSION     : 0.1
 VENDOR	     : N/A
 DOWNLOAD    : http://downloads.sourceforge.net/benjacms
#####################################################

--- Broken Authentication ---

Anonymous can access to administrative control that can add/delete menu
[+] http://[Target]/[benjacms_path]/admin/


--- Arbitrary File upload ---

Upload Path:
[+] http://[Target]/[benjacms_path]/admin/upload.php

File Location:
[+] http://[Target]/[benjacms_path]/billeder/[Evil File]

***Can upload malicious files such as php shell script***


--- Remote XSS Exploit ---

---------
 Exploit
---------

[+] http://[Target]/[benjacms_path]/admin/admin_edit_submenu.php/<XSS>
[+] http://[Target]/[benjacms_path]/admin/admin_new_submenu.php/<XSS>
[+] http://[Target]/[benjacms_path]/admin/admin_edit_topmenu.php/<XSS>

##################################################################
  Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  
##################################################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ