Rapidleech Cross Site Scripting

2011-12-31 / 2012-10-05
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

############################################################################ # Exploit Title: Rapidleech <= (audl.php) Cross Site Scripting # Google Dork: inurl:"audl.php" or intitle:"Rapidleech" # Date: 20/12/2011 # Author: H4ckCity Security Team # Discovered By: farbodmahini # Home: WwW.H4ckCity.Org # Software Link: http://dl.p30vel.ir/RapidLeech-pre_release-for_v43-Rev_397.zip # Version: All Version # Security Risk:: Low # Tested on: GNU/Linux Ubuntu - Windows Server ############################################################################ # Exploit: # # Go To This :http://target.com/audl.php # # Enter In TextBox <script>alert(/farbodmahini/)</script> and click on # Transload files. # # # Demo: # # http://www.gigaleecher.com/audl.php # http://aeon.zonyx.tv/audl.php # ############################################################################ # Special Thanks : Mehdi.H4ckcity-2MzRp-Mikili-M.Prince-Bl4ck.Viper-iC0d3R- # nitrojen90-K0242-kingcope-Mr.M4st3r , ... ############################################################################ GreetZ : All H4ckCity Member - BHG members ############################################################################

References:

http://www.gigaleecher.com/audl.php
http://aeon.zonyx.tv/audl.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top