[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Akiva WebBoard 8.x SQL Injection Vulnerability

Author
Alexander Fuchs
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-17318
Category
web applications
Date add
30-12-2011
Platform
php
# Exploit Title: Akiva Webboard 8.x SQL Injection + Plaintext Passwords
in Profiles.
# Google Dork: " /Powered by WebBoard 8"/
# Date: 30.12.2011
# Author: Alexander Fuchs
# Software Link: http://www.akiva.com/default.asp?l=1&id=8
# Version: 8.x
# Tested on: Windows, Linux.
# CVE :  Nope.
 
It is possible to login as administrator with admin'-- as username and
password.
You can now go in the  admin profil to look at the password which is in 
plaintext in html.



#  0day.today [2024-11-13]  #