Dragonfly CMS 9.0.6.1 and prior XSS

2006.08.18
Credit: HeLiOsZ RooT
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

## HeLiOsZ - Dark End Team - Internet Security Team ## Dragonfly CMS 9.0.6.1 and prior XSS ## IRC: darkend.sytes.net #darkend , http://darkend.sytes.net & http://www.darkend.org ## Rish : Medium ## Type : web applet ## Creator: http://www.cpgnuke.com/ ## Exploit: - The vuln is in the search section,it don't validate the imput. To exploit this vuln you simply need an Internet Browser,you must only use a cookie logger to get the Portal cookies. To know if it is vulnerable: <script>alert('This is an XSS Vulnerability')</script> ## Dork: Interactive software released under GNU GPL, Code Credits, Privacy Policy _________________________________________________________________ Don't just search. Find. Check out the new MSN Search! http://search.msn.com/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top