Pop Under Ads Network 1.0 MySQL Credential Disclosure

2016-09-24T00:00:00
ID PACKETSTORM:138849
Type packetstorm
Reporter indoushka
Modified 2016-09-24T00:00:00

Description

                                        
                                            `| # Title : pop under ads network v1.0 MySQL connection credentials Vulnerability  
| # Author : indoushka  
| # email : indoushka4ever@gmail.com  
| # Tested on : windows 8.1 FranASSais V.(Pro)  
| # Version : 1.0  
| # Vendor : http://dl.20script.ir/script/ads/20S-pop-under-ads-network-v1.0[www.20script.ir].zip  
========================================================================  
  
Vulnerability description :  
  
For a client program to be able to connect to the MySQL server,   
it must use the proper connection parameters,   
such as the name of the host where the server is running and   
the user name and password of your MySQL account.   
This file contains full/partial source code that contains   
a mysql_connect/mysql_pconnect function call that includes   
the MySQL connection credentials. This information   
is highly sensitive and should not be found on a production system.  
  
poc :  
  
1 - right click and open the page source .  
  
2 - http://b.top4top.net/p_201kowq1.jpg  
  
Greetz :----------------------------------------------------------------  
|  
jericho * Larry W. Cashdollar * moncet-1 * achraf.tn |  
|  
========================================================================  
`