Milw0rm Clone Script 1.0 Cross Site Scripting

2015.09.04
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Milw0rm Clone Script 1.0 - XSS Vulnerability # Date: 03.09.2015 # Exploit Author: CrashBandicot @DosPerl # Vendor Homepage: http://milw0rm.sourceforge.net/ # Software Link: http://sourceforge.net/projects/milw0rm/files/milw0rm.rar/download # Version: v1.0 # Tested on: MSWin64 Vulnerable File : install/step1.php 53. <input type="text" name="SERVER_NAME" value="<? echo $_POST['SERVER_NAME']; ?>"> ... 61. <input type="text" name="SERVER_USER" value="<? echo $_POST['SERVER_USER']; ?>"> ... 70. <input type="text" name="SERVER_PASS" value="<? echo $_POST['SERVER_PASS']; ?>"> ... 78. <input type="text" name="SERVER_DB" value="<? echo $_POST['SERVER_DB']; ?>"> File /install/step1.php Method : POST Vuln Parameter : SERVER_NAME , SERVER_USER , SERVER_PASS , SERVER_DB


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top