Oneblog 2.0 Cross Site Scripting

2016.10.18
Credit: Nassim Asrir
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title :----------------- : Oneblog v2.0 - (posts_new.php) - Stored XSS # Author :------------------------ : Nassim Asrir # Author Company :------------------------ : HenceForth # Author Email :------------------------ : wassline@gmail.com # Google Dork :---------------- : - # Date :-------------------------- : 14/10/2016 # Type :-------------------------- : webapps # Platform : -------------------- : PHP # Software link : -------------- : http://wmscripti.com/php-scriptler/oneblog-blog-scripti.html ############################ Stored XSS Vulnerabilty ############################ ## Code ## }else{ $message = $_POST['message']; } if($title && $name && $message) { $query = "INSERT INTO blog (title, author, post, date) VALUES ('$title', '$name', '$message', NOW())"; $result = mysql_query($query); ## Proc ## - As you see the parameter ($message) is not protected using (html_entity_decode OR strip_tags). - To test it . go to Admin panel . "http://yoursite/admin/posts_new.php" and create in the Message box: "><script>alert(1);</script>. - and go to home page and you can see the alert and when any visitor visit your site he see the alert. ## Thnks To ## - All Muslim Hackerz


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top