Tiny MySQL XSS Exploit

2015.05.15
Credit: John Page
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Tiny MySQL XSS Exploit # Google Dork: intitle: XSS # Date: May 14, 2015 # Exploit Author: John Page (hyp3rlinx) # Website: hyp3rlinx.altervista.org # Vendor Homepage: github.com/einars/tinymy # Software Link: github.com/einars/tinymy # Version: NA # Tested on: Windows 7 using XAMPP # Category: XSS # CVE : NA Source: http://hyp3rlinx.altervista.org/advisories/AS-TINYMY0514.txt Product: Tiny MySQL web console. Advisory Information: ===================================================== Tiny MySQL web console vulnerable to XSS attack. Exploit code: ============== http://localhost/tinymy/tinymy.php?act=sel_table&table=',alert("XSS By hyp3rlinx")// Disclosure Timeline: ================================== Vendor Notification May 13, 2015 Vendor Fix: May 14, 2015 May 14, 2015: Public Disclosure Severity Level: =============== High Description: ============ Request Method(s): [+] GET Vulnerable Product: [+] Tiny MySQL Vulnerable Parameter(s): [+] table=[XSS] Affected Area(s): [+] Admin console. ============================== (hyp3rlinx)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top