Lucene search

K
exploitdbSid3^effectsEDB-ID:14260
HistoryJul 07, 2010 - 12:00 a.m.

Sijio Community Software - SQL Injection / Persistent Cross-Site Scripting

2010-07-0700:00:00
Sid3^effects
www.exploit-db.com
33

AI Score

7.4

Confidence

Low

########################################################
#   I'm SiD3^effects member from Inj3ct0r Team         #
#    Support e-mail  : submit[at]inj3ct0r.com          #
########################################################
Name : Sijio Community Software SQLi/Persistent XSS Vulnerability
Date : july, 7 2010
Critical Level 	: HIGH
Vendor Url : http://www.sijio.com/
Google Dork: © Powered by sijio - Community Software
Author : Sid3^effects aKa HaRi <shell_c99[at]yahoo.com>
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,KeDar,Sonic,gunslinger_
greetz to :www.topsecure.net ,All ICW members and my friends :) luv y0 guyz 
#######################################################################################################
Xploit:SQLi Vulnerability 

DEMO URL : http://server/gallery/?parent=[SQLi]
########################################################################################################
Xploit:Persistent XSS Vulnerability

 The following script has persistent xss vuln in the blog section. 
Step 1: Register :D 

Step 2: Goto your blog section and post your new evil blog :P

Demo url :http://server/my_blogs/

Post your evil xss content in the blog section and the url is http://www.axlex.com/edit_blog/

Attack Pattern :">><marquee><h1>XSS3d By Sid3^effects</h1><marquee> 
Step 3 : Now goto the main page,check the blog section and the url is http://www.axlex.com/blogs/ and find your evil script:P
 
The attacker can injected evil xss script in the blog section :D 
########################################################################################################
# 0day no more 
# Sid3^effects 

AI Score

7.4

Confidence

Low

Related for EDB-ID:14260