0 Members and 7 Guests are viewing this topic.
and here is your PoC lelCode: [Select]for n in range(0,68719476735): print hex(n).zfill(6).replace("x", "")
for n in range(0,68719476735): print hex(n).zfill(6).replace("x", "")
Shut the fuck up.
...That's a small DoS attack and I don't think an admin exists that wouldn't notice it. Even if you did throttle it back to a conservative rate :p
Actually, there just needs to be one successful bruteforce attempt against one Super-Admin and everything will be over. if you can do that attack with <10 mins, with rented zombies or whatever, it means that, you can take over the whole EZ. :/I have faced similar problem with Facebook. http://paulosyibelo.blogspot.com/2014/08/ow-facebook-taking-over-random-accounts.html
and ^ there you have some info to look for more info, LOL. thanks Phage and still RCE in Forums is enough to infect more users and escalate the attack to more worse scenarios, very worse (I leave that to your imaginations)
How would you turn an admin account into remote code execution?
Well Phage, I am pretty sure someone will manage something out once being Admin? I am sure it isn't that complex. even if I can write Javascript, it won't be that hard afterwards. :/
I know the admin panel, and there's no way you could do that.
It is very easily possible. Though that would require being admin which is only given to people who would need access to do updates etc anyway.