Simple PHP Blog 0.8.4 Cross Site Scripting

2016-10-08T00:00:00
ID PACKETSTORM:139036
Type packetstorm
Reporter indoushka
Modified 2016-10-08T00:00:00

Description

                                        
                                            `========================================================================  
| # Title : Simple PHP Blog 0.8.4 XSS vulnerability  
| # Author : indoushka  
| # email : indoushka4ever@gmail.com  
| # Tested on : windows 8.1 FranASSais V.(Pro)  
| # Version : 0.8.4  
| # Vendor : https://sourceforge.net/projects/sphpblog/  
| # Dork : Product of ProfiAnts - SimplePHPscripts.com  
========================================================================  
  
poc :  
  
Cross site scripting (also referred to as XSS)   
is a vulnerability that allows an attacker   
to send malicious code (usually in the form of Javascript)   
to another user.   
Because a browser cannot know if the script   
should be trusted or not, it will execute the script in the user context allowing   
the attacker to access any cookies or session tokens retained by the browser.   
  
This vulnerability affects /preview.php  
  
Attack details :  
  
Path Fragment input / was set to <marquee><font color=lime size=32>indoushka</font></marquee>  
The input is reflected inside a text element.  
  
note : look down  
  
http://simpleblogphp.com//blog/preview.php?cat_id=&p=&search=button=SEND&act=post_comment&comment=1&email=sample%40email.tst&name=wennhmuk%27%22()%26%25%3Cacx%3E%3Cmarquee%3E%3Cfont%20color=lime%20size=32%3Eindoushka%3C/font%3E%3C/marquee%3E&pid=773&string=1  
  
  
Greetz : aua'>>a'1/2a'1/2a'dega'deg aua'degaua'degau a'>>a'*a'*auaua'>>------au-auau-a'deg a'degaua'degauPSaua'3a'>>au-------- aua'degauau!a'>>auau aua'degauaua'*oauaua'degau ------  
|  
jericho * Larry W. Cashdollar * moncet-1 * achraf.tn |  
|  
===================== pa'degaua'1/2a'>>au auauoauau aua'>>auauauauauauC/ =============================  
`