Home / exploitsPDF  

Pop Under Ads Network 1.0 MySQL Credential Disclosure

Posted on 27 September 2016

| # Title : pop under ads network v1.0 MySQL connection credentials Vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 8.1 FranASSais V.(Pro) | # Version : 1.0 | # Vendor : http://dl.20script.ir/script/ads/20S-pop-under-ads-network-v1.0[www.20script.ir].zip ======================================================================== Vulnerability description : For a client program to be able to connect to the MySQL server, it must use the proper connection parameters, such as the name of the host where the server is running and the user name and password of your MySQL account. This file contains full/partial source code that contains a mysql_connect/mysql_pconnect function call that includes the MySQL connection credentials. This information is highly sensitive and should not be found on a production system. poc : 1 - right click and open the page source . 2 - http://b.top4top.net/p_201kowq1.jpg Greetz :---------------------------------------------------------------- | jericho * Larry W. Cashdollar * moncet-1 * achraf.tn | | ========================================================================

 

TOP