0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Calendar Script Easy Membership Management Application Persistent XSS Vulnerability
Advisory:Calendar Script Easy Membership Management Application(E.M.M.A) Persistent XSS Vulnerability Version:1.2 Vendor URL: http://calendarscripts.info/emma/ Demo Link: http://demo.pimteam.net/emma/admin.php Author: Viknesvaran Sittaramane Category: Webapp Twiiter: https://twitter.com/csvsn ~.~.~.~.~.~.~.~.~.~.~. Product Description ~.~.~.~.~.~.~.~.~.~.~. E.M.M.A. Is Easy Membership Management Application Features: Create different subscription plans Select subscription plan for every content Upload protected pages, images and downloadable files Your users can renew or upgrade their subscriptions any time ~.~.~.~.~.~.~.~.~.~.~. Vulnerability Description ~.~.~.~.~.~.~.~.~.~.~. E.M.M.A multiple fields suffers from Persistent XSS Vulnerability ~.~.~.~.~.~. PoC-Exploit ~.~.~.~.~.~. ---------------------- Front End of E.M.M.A : ---------------------- Step1: Go to the Registration form Registration Demo url : http://demo.pimteam.net/emma/index.php?action=register Step2: On the fields Name, Address, Buiness name,Tel, Mob, Test Field, Association enter the malicious script then SIGN UP Step3: Login using the registered email and password -> Go to Edit Profile -> Pop Up Appears Step4: Persistant XSS Confirmed Parameter used : '"--><script>alert(0x000872)</script> Screenshot: http://i47.tinypic.com/wvve4o.png -------------------------------- Administrator Panel of E.M.M.A : -------------------------------- Demo URL for E.M.M.A Administrator Panel : http://demo.pimteam.net/emma/admin.php?1358152765 Step1: Login to E.M.M.A Step2:Under Manage users Tab (Manage users) a.Edit any Username and replace username with a malicious script and Save it (Same goes to Create new user) b. A Pop up appears -> Persistent XSS Step3:Under Manage Site Tab (Content Categories) a.Under name field insert a malicious script and Save it (Add Category) b. A Pop up appears -> Persistent XSS Step4:Under Manage Site Tab (Manage Contents->Click here to Upload Contents) a.Content/page title and description field insert a malicious script and Save it (Add Plan) b. A Pop up appears -> Persistent XSS Step5:Under Manage Site Tab (Subscription Plans) a.Under Plane name field insert a malicious script and Save it b. A Pop up appears -> Persistent XSS Parameter used : '"--><script>alert(0x000872)</script> # 0day.today [2024-10-06] #