Advertisement




Edit Report

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006050032

Below is a copy:

FileProtection Express <= 1.0.1 authentification bypass

Discovered by: Nomenumbra

Date: 5/2/2006

impact:high (privilege escalation,full file access)

Ok, this is absurd, the only form of authentification to the Admin panel is controlled by
a cookie value. Use firefox CookieEditor extension for example and make a cookie of the target
domain containing a value called Admin and set it to 1 (I really wonder if the word security is
actually in the dictionary you know...)

Nomenumbra/[0x4F4C]

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.