exploit-db-mirror/exploits/php/webapps/8296.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

23 lines
No EOL
980 B
Text

#################################\
# Information
# Script : Arcadwy Arcade Script CMS
# Buy/Download : http://arcadwy.com/
# Vulnerability : Static XSS
# Discovered by : Anarchy Angel
# Contact : anarchy[dot]ang31 [@] gmail
# Website : http://hha.zapto.org
# Greets : Xteaphn, lun0s, BSDgurl, progenic.
\#################################/
[!] EXPLOIT
1) Go to http://site.com/register.php
2) In username field input XSS payload
3) Fill in the rest of the fields and submit.
4) Activate account!
Every time the accounts username is shown on the site the XSS will run.
Usernames show in comments, game scores, and so on.
[!] FIX: Sanitize all input from the registers page form.
# milw0rm.com [2009-03-27]