Security Researcher (Ragezone vulnerability)

Results 1 to 6 of 6
  1. #1
    Newbie Eletroplus is offline
    MemberRank
    Dec 2015 Join Date
    2Posts

    ! Security Researcher (Ragezone vulnerability)


    RaGEZONE Recommends

    RaGEZONE Recommends

    Dear community

    Admins contact with me! https://twitter.com/Eletroplus or skype: louc000

    vulnerability 1 (mysql error): https://twitter.com/Eletroplus/statu...82884977709056


    vulnerability 2 (Open Redirect): https://forum.ragezone.com/redirect-...com/Eletroplus



  2. #2
    GET OVER HERE! MentaL is offline
      Administrator  Rank
    Dec 2000 Join Date
    32,919Posts

    Re: Security Researcher (Ragezone vulnerability)

    1: SQL connection limit has been reached, not a vulnerability just my.cnf limit rearched.
    2: Redirect is open and always has been, its a part of our link logging system with vbulletin.
    RaGEZONE Recommends

  3. #3
    Newbie Eletroplus is offline
    MemberRank
    Dec 2015 Join Date
    2Posts

    thumbs up Re: Security Researcher (Ragezone vulnerability)

    Quote Originally Posted by MentaL View Post
    1: SQL connection limit has been reached, not a vulnerability just my.cnf limit rearched.
    2: Redirect is open and always has been, its a part of our link logging system with vbulletin.

    XSS > Also part of your system? Screenshot by Lightshot

  4. #4
    ThuGie.NL - Webmaster ThuGie is offline
    True MemberRank
    Apr 2006 Join Date
    NetherlandsLocation
    1,150Posts

    Re: Security Researcher (Ragezone vulnerability)

    Of course it is, how else are we going to troll each other ?
    Hate me or Love me, Just dont bother me!
    Only argument i lose, is a argument with my gf, where even when i am right i lose

  5. #5
    Non Omnis Moriar Kreeate is offline
    LegendRank
    Aug 2010 Join Date
    2,322Posts

    Re: Security Researcher (Ragezone vulnerability)

    #Closed
    IXXI

  6. #6
    GET OVER HERE! MentaL is offline
      Administrator  Rank
    Dec 2000 Join Date
    32,919Posts

    Re: Security Researcher (Ragezone vulnerability)

    189.110.84.173 - - [10/Nov/2016:01:38:23 +0000] "GET /redirect-to/?redirect=https://www.********.org HTTP/1.1" 301 617 "https://www.openbugbounty.org/incidents/110930/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0"
    189.110.84.173 - - [10/Nov/2016:01:38:58 +0000] "GET /redirect-to/?redirect=https://twitter.com/Eletroplus HTTP/1.1" 301 617 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0"
    189.110.84.173 - - [11/Nov/2016:18:59:09 +0000] "GET /cache.php?img=http%3A%2F%2Fi.imgur.com%2FDAG6Ttb.png HTTP/1.1" 301 617 "http://forum.ragezone.com/members/176864.html" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0"


    Ugh....

    deception ... not good!
    RaGEZONE Recommends




Advertisement