0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
GotoCode Online Bookstore Multiple Vulnerabilities
############################################################################### # Exploit Title : GotoCode Online Bookstore Multiple Vulnerabilities # Vulnerability : Privilege Escalation / Remote Database Download # Date : 03/10/2011 # Author : Nathaniel Carew # Email : njcarew@gmail.com # Impact : High # Software Link : http://www.gotocode.com/apps.asp?app_id=3& # Platform : ASP.NET # Tested on : MS Windows Server Standard 2003 SP2 / IIS 6 # Thanks : Peregrinus & Birch Meister General ############################################################################### Overview: --------- Database: If the application is configured using the default directory structure and an access database then a user can download the access database. Privilege Escalation: By modifying the Form_member_id and p_Form_member_id variables to the ID of the admin account (default ID is 7) on the MyInfo.aspx page in the POST data you can reset the admin password with the password you entered into the appropriate feed to gain full admin rights to the web application. Proof of Concept: ----------------- http://localhost/[path]/BookStore_MSAccess.mdb http://localhost/[path]/MyInfo.aspx?p_Form_member_id=7&Form_member_id=7&Form_member_password=moo&Form_name=Administrator&Form_last_name=Account&Form_email=admin%40localhost&Form_address=&Form_phone=&Form_notes=&Form_card_type_id=1&Form_card_number=111111111111 Impact: ------- By resetting the admin password an attacker would be able to completely control the application, users and their associated data such as stored credit card information. Successful database exploitation would allow an attacker to download the complete database of users information including email addresses usernames, passwords, credit cards and associated billing and ordering data. # 0day.today [2024-11-16] #