Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Browser Based File Manager Administration Vulnerability
From: "eric basher" <basher13 () linuxmail org>
Date: Mon, 09 May 2005 04:55:08 +0800

3:59 15/05/08

" Browser Based File Manager Administration  Vulnerability "

Vulnerable version:
Browser Based File Manager 1.0

The Net56 File Manager application is completely browser based allowing you to focus 
on handling files and folders at remote locations using only a browser. By maintaining 
a state-of-the-art intranet, it ensures maximum efficiency, quality control and effective 
communication. With File Manager you can create new folders, upload files, move, rename 
and delete files all through a web browser and send shareable links to colleagues.

The administration page is so vulnerability to get access admin privallage.
Use method SQL Injection in the form admin login,after succesfull logged,
then we can run as Admininistration of website.
User may can upload malicious script,backdoors,trojan that can made run to the 
Administration system computer.

Sample of client:
On the login form use method SQL Injection:

Project ID : 001
User ID : admin
Password : 'or '='

W00t! we have g0t Admin land...

Vendor had being contact

Vendor URL:

Published by - basher13[basher13 () linuxmail org]
Check out the latest SMS services @ http://www.linuxmail.org
This allows you to send and receive SMS through your mailbox.

Powered by Outblaze
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • Browser Based File Manager Administration Vulnerability eric basher (May 08)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]