lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 13 Aug 2009 14:36:02 -0600 From: ostoure.sazan@...il.com To: bugtraq@...urityfocus.com Subject: new vulnerability founded by ostoure ___________________________www.Ostoure.com________________________________ | | Ostoure Security Research Team | | Title: Naroun ADSL-Tools authentication Bypass | Vendor: http://www.mixoftix.net | Exploitation: Remote with browser ___________________________________________________________________________ ==================== - Description: ==================== The data in the admin folder "operator" can be accessed via a normal session without authentication, someone can do this to view other people's usernames and passwords You can access other people's account information, by entering the URL of your own account information, and changing the account number in the URL to another person's number. ==================== - exploit: ==================== First u must loggin with your user & password http://crm.victim.com/operator/members_general_info_print.asp?nick=[number] you must enter other user in number part Found By Ostoure sazan sharif
Powered by blists - more mailing lists