Lucene search

K

siteman1111-disclose.txt

🗓️ 27 Jan 2007 00:00:00Reported by CorryLType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 15 Views

Siteman 1.1.11 vulnerability allows remote exposure of user and admin credentials.

Show more
Code
`-=[--------------------ADVISORY-------------------]=-  
  
Siteman 1.1.11   
  
Author: CorryL [[email protected]]   
-=[-----------------------------------------------]=-  
  
  
-=[+] Application: Siteman   
-=[+] Version: 1.1.11  
-=[+] Vendor's URL: http://home.no.net/siteman/  
-=[+] Platform: Windows\Linux\Unix  
-=[+] Bug type: Remote Md5 Hash Disclosure Vulnerability  
-=[+] Exploitation: Remote  
-=[-]  
-=[+] Author: CorryL ~ corryl80[at]gmail[dot]com ~  
-=[+] Reference: www.x0n3-h4ck.org  
-=[+] Virtual Office: http://www.kasamba.com/CorryL  
-=[+] Irc Chan: irc.darksin.net #x0n3-h4ck   
  
  
..::[ Descriprion ]::..  
  
This is the home of the Siteman project,   
a content management system using the flat-file database system txtSQL for data storage.   
  
  
..::[ Bug ]::..  
  
exploiting this bug a remote attaker is able to go up again to user name and admin password  
what they are found to the first position  
  
  
..::[ Proof Of Concept ]::..  
  
http://remote-server/data/members.txt  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
27 Jan 2007 00:00Current
7.4High risk
Vulners AI Score7.4
15
.json
Report