exploit the possibilities


Posted Jan 31, 2000
Authored by Skirkham

Exploit for Cobalt Raq2 Server. Requires Site Administrator access to one of the accounts on the server.

tags | exploit
MD5 | 3432696a228bd51795c33223d2d537b2


Change Mirror Download
 To replicate this bug you must have Site Administrator access to one of
the accounts on the server. When you go into the Site Management for a
and select the User Management option, you get a list of the usernames
have been setup for that account. The green pencil edit icon is a command
to execute the JavaScript function modify() and it passes the username as
the only variable into the function. To properly execute a function from
the Location Bar in Netscape, the HTML page has to be the top frame. I
simply opened the userList.html file in a new frame. When you type
"javascript: modify( 'admin' );" into the Location Bar, the modify()
function returns a URL. The URL returned when accessing it from my site
me=admin&group=site151&949015199230". This loads a standard Modify User
page for the "admin" account. However, when you attempt to change this
information by clicking the "Confirm Modify" button, it returns a
error because the function that it calls upon is dependant on the frame
layout of the Site Management page. To overcome this issue I simply
downloaded two HTML files to my hard disk. One is the index.html file,
other other is the right.html file. I basically changed the index.html
to call upon the URL's on my site and had it load the right.html file
locally off my hard disk. I then changed the right.html file to load the
URL's on my site but changed the "main" frame source to
me=admin&group=site151&949015199230" - the Modify User page for the
account. It then loads up with all the correct frames AND the Modify User
page for the "admin" account. I very simply just enter a new password for
the user and click "Confirm Modify" and presto! The admin password is
changed allowing me access to the Server Management page showing all the
server's clients, IP addresses, domain names, and ability to access all
client's contact people, telephone numbers, usernames, and passwords. I
also could delete any sites/files or downloaded any sites/files. I then
full access via FTP to the site showing the root directory of the server,
and the ability to delete any evidence via the /log/ directory.

I hope this answers any of the questions you had, and the whole
took me under 5 minutes!

-- snip snip --

the users email address is skirkham@telusplanet.net if you have any
questions about it...


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    11 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    17 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By